Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Endpoint Security Blog
Showing posts tagged with Endpoint Protection (AntiVirus)
Showing posts in English
piero_depaoli | 01 Oct 2013 | 1 comment

Every day we’re bombarded with news about the latest data breach. Unfortunately, the headlines we all read confirm findings in Symantec’s recent Internet Security Threat Report: the threat from hackers is not only growing but evolving.  Today’s cybersecurity landscape requires more than antivirus; advanced malware protection requires up-to-date technology with the ability to stop unknown threats. In fact, Symantec’s research showed that 51 percent of threats blocked by Symantec Endpoint Protection were stopped by technologies other than antivirus in 2012. Clearly, AV alone is not enough, and neither is outdated protection.

For customers to truly leverage their full security investment, it’s imperative that they upgrade to the latest, most robust product...

piero_depaoli | 02 Jun 2014 | 0 comments

The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities.

While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?”

As a worldwide leader in information protection, Symantec not only has a comprehensive suite...

Kari Ann | 25 Apr 2014 | 3 comments

As you may already know, Microsoft has officially ended support for Windows XP. (You can access the official Microsoft announcement here: http://www.microsoft.com/en-us/windows/endofsupport.aspx)

If you are a Symantec Endpoint Protection customer who uses machines running on Windows XP, you may wonder how this will impact your protection and system security. This post covers a few important things we think you should know.

  1. Do I need to move to a new operating system?

Yes! We want you to be as secure as possible and the best way to do that is to migrate to a fully supported Microsoft operating System. Attackers will continue to find exploits they can leverage to gain access to your systems. While Symantec solutions will protect you from new and emerging threats, ultimately a strong security strategy includes adopting the latest operating system and security...

Symantec Corp. | 04 Mar 2014 | 7 comments

The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, approximately 30 percent of desktop operating systems still run on Windows XP today and could be left vulnerable after April 8. 

At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your enterprise’s information, systems and devices. However, even the best security products can’t fully protect an outdated operating system. XP users will face increased risks after April 8 as cybercriminals try to take advantage of vulnerabilities. 

Symantec’s security solutions will...

torsten_knorr | 13 Feb 2014 | 18 comments

BCS SECURITY NEWSFLASH.jpg

Symantec Product Security has posted SYM14-004 - Product Security Advisory for Symantec Endpoint Protection Management Vulnerabilities

 

  • A Security Advisory has been posted.
     
  • This is a High Severity Advisory which identifies multiple vulnerabilities in the Symantec Endpoint Protection Manager.
    A BCS Bulletin is being sent.
     
  • While there are no known exploits taking advantage of this vulnerability, Symantec is urging all customers to update their managers to the latest version, Symantec Endpoint Protection Manager 12.1 RU4a, as soon as possible. Clients are not affected and do not need to be updated. As part of normal best practices, Symantec strongly recommends keeping all operating systems and applications updated with the latest vendor patches.  ...
mmarfise | 29 Jul 2013 | 1 comment

Not too many years ago, a camera was a single, discrete piece of equipment developed to do one thing--take pictures. For the most part, it fulfilled the need well. But over the last decade, we've seen an unprecedented integration of photographic and other useful technologies into a single device – today's smartphone. Now we not only have the ability to record photos and video with a moment's notice, we can even send pictures digitally to friends and family in real time, from the same device.

Technology continually evolves. Case-in-point...do you expect the same clarity from your 1.3-megapixel camera phone from 2007 that you require from today’s smartphone? Of course not. Unfortunately, it’s not just legitimate businesses making technological improvements to their products. Cybercriminals are also evolving and cooking up new ways to steal information from businesses and wreak havoc on individual machines and entire networks. As a result, security...

Duncan Mills | 02 May 2013 | 0 comments

The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost benefits. However, it also presents a number of complex challenges related to security.

Due to the rise of smart media devices like smartphones, tablets and ultrabooks, it is estimated that potentially, as many as 30-35%* of endpoints connected to a company’s network could be unmanaged. These are more at risk than managed endpoints which are typically subject to software patching and endpoint security policies.

Of course unmanaged endpoints are still protected by your perimeter security, such as secure web gateways. However, these have typically evolved from caching proxies and URL filters. What you need is an additional layer of security that provides the best possible levels of protection for unmanaged endpoints.

Symantec Web Gateway (SWG) will...

mmarfise | 08 Feb 2013 | 0 comments

The first focus at Symantec is on our customers and keeping them protected. Constant research and innovation are required to help organizations stay ahead of today’s modern malware. We also work closely with top research firms to make sure we’re addressing key market concerns. We believe that analysts are a fantastic resource to aggregate customer feedback, and we also believe that they represent the voice of potential customers. Firms like Forrester Research, Inc., let us know when we need to improve and when we’re getting it right. With that in mind, I’m very pleased to share The Forrester Wave™: Endpoint Security, Q1 2013.

Forrester Research positioned Symantec as a leader in The Forrester Wave: Endpoint Security, Q1 2013 report published in January 2013 by Chenxi Wang and Chris Sherman. Forrester employs a rigorous process to create a Forrester Wave that employs a...

Neelum | 10 Jan 2013 | 0 comments

Why is server security different from other endpoint security? If you’re considering a solution to protect one or all of the endpoints in your environment, it's important to understand the security requirements for laptops and desktops, how they differ from servers, and why servers have greater needs for security and compliance. 

Symantec partnered with eWeek to create Security Differentiators for Servers, Laptops: 10 Best Practices. Read about the best practices here: http://www.eweek.com/security/slideshows/security-differentiators-for-servers-laptops-10-best-practices/

Thanks for reading!

-Neelum

mmarfise | 04 Jan 2013 | 0 comments

Symantec works hard to create security solutions that address the needs of our customers. We listen closely to them, incorporate their suggestions and help them tackle their challenges. As a result, Symantec Endpoint Protection 12 has been deployed on more than 9 million endpoints.  That’s significant validation that our product is working well for customers. But industry recognition makes us happy too. We work with many smart analysts at the most influential firms who provide us with wise counsel, tough critiques when necessary as well as honest accolades. To that end, I’m very pleased to share Gartner’s recent Magic Quadrant for Endpoint Protection Platforms.

Gartner, Inc. positioned Symantec as a leader in its 2013 Magic Quadrant for Endpoint Protection Platforms report on January 2, 2013; the research and subsequent report was authored by a team of distinguished Gartner analysts including: Peter...