Video Screencast Help
Endpoint Security Blog
Showing posts tagged with Critical System Protection
Showing posts in English
Neelum | 29 Jul 2013 | 1 comment

 

The latest release of Symantec Critical System Protection, 5.2.9 MP3, further expands its server security platform support to:

•  Windows Server Core 2008, 2012

•  Windows Embedded POSReady7

•  SUSE Linux Enterprise Server 11 SP3  (32-bit and 64-bit) 

See Symantec Critical System Protection Platform and Feature Matrix for details on specific platforms, version, and the features they support. 

For more information on policy-based server security from Symantec go to: 
http://www.symantec.com/critical-system-protection  

 

Neelum | 01 May 2013 | 0 comments

 

According to the 2013 Verizon Breach Report data breaches affect organizations of all sizes, across all sectors with 92 percent of them attributable to outsiders and 14 percent committed by insiders.  What are your top security concerns? We want to hear from you! Answer 7 questions and receive a personalized scorecard with recommended next steps: https://scm.symantec.com/critical-system-protection-survey/en/

Look forward to your responses. 

Thanks for reading!
Neelum 

Neelum | 29 Mar 2013 | 0 comments

 

The latest release of Symantec Critical System Protection, 5.2.9 MP2, includes expanded platform support and ease-of-use enhancements to further simplify intrusion prevention. 

Expanded platform support: In 5.2.9 MP2, Symantec Critical System Protection extends support to Oracle Linux 5.8, 5.9 and 6.3 64 bit with Unbreakable Enterprise Kernel Release 2. This release also adds platform support for RedHat Enterprise Linux 6.4 64 bit. For more information on specific platforms, versions and the features they support, see Symantec Critical System Protection Platform and Feature Matrix.

Ease-of-use enhancements: The console has been updated to allow users to select multiple prevention custom policies and apply them to a group, further simplifying policy management and intrusion prevention.

For more information...

Neelum | 10 Jan 2013 | 0 comments

Why is server security different from other endpoint security? If you’re considering a solution to protect one or all of the endpoints in your environment, it's important to understand the security requirements for laptops and desktops, how they differ from servers, and why servers have greater needs for security and compliance. 

Symantec partnered with eWeek to create Security Differentiators for Servers, Laptops: 10 Best Practices. Read about the best practices here: http://www.eweek.com/security/slideshows/security-differentiators-for-servers-laptops-10-best-practices/

Thanks for reading!

-Neelum

pwadia | 11 Dec 2012 | 0 comments

With the latest release of Symantec Critical System Protection 5.2.9 MP1, organizations can address the needs of older Windows 32-bit platforms that are vulnerable to advanced memory attacks. The Memory Control feature in this release allows you to combat these advanced memory attacks, like reflective DLL injection.

Memory Control is another layer in Critical System Protection’s defense-in-depth approach to security that allows you to:

  1. Protect your critical systems from memory-based attacks, such as memory injections and in-memory executables  
  2. Stop malicious code from being loaded and executed within the memory space of core system services
  3. Prevent malware from using in-memory manipulation techniques within an exploited process

The Symantec Critical System Protection 5.2.9 MP1 release also includes expanded platform support for Windows 7 Embedded (32-bit and 64-bit).

For more information about Critical...

pwadia | 05 Nov 2012 | 4 comments

As the security landscape evolves, risk increases. Sealed Air Corporation needed to protect their information and identities, while providing a strategic proactive security solution with endpoint proliferation. To tackle this issue, Sealed Air Corporation turned to Symantec. Both Symantec Endpoint Protection and Symantec Critical System Protection were utilized to provide a broad set of risk management in several ways. Benefits included:Integrated endpoint security, high system uptime, and support within their virtualized environment. To learn more about how Symantec and Sealed Air Corporation teamed up to manage risk, check out this video http://bit.ly/TmtgdA

 

Due to the extent of virtualization in their data center, the Sealed Air team also plans to add Symantec Critical System Protection.  Within the year, it will be rolled out across a segment of Sealed Air’s more than 1,000 physical and...

pwadia | 16 Oct 2012 | 0 comments

Symantec and Wincor Nixdorf have announced a new partnership, with the aim of making self-service banking solutions from different vendors all over the globe even more secure. Core components of Symantec Critical System Protection and Wincor’s Intrusion Protection will protect systems from digital sabotage and unauthorized attacks from outside.

 

“Cyber attacks today are carried out with ever greater precision and are easier than ever to launch, as Symantec’s Internet Security Threat Report Volume 17 shows this year. Financial institutions are popular, highly profitable targets, so it is vital that they make considerable efforts to protect the information andassets of their customers from theft,” explains Doug Bowers, Vice President of Engineering at Symantec: “By cooperating with a leading IT solution provider for retail banking and adapting the solution...

pwadia | 16 Oct 2012 | 0 comments

In the third Symantec Cyber Security Challenges, more than a hundred seasoned hackers and security professionals came out to Washington University in St. Louis on 9.12.2012.  The “challenge” included an exciting cyber “Capture the Flag” simulation and the chance to win $20,000.  The hackers were presented with a challenge to gain access to key data on two systems (Linux and Windows) with confidential information.  The Linux system was simulating a nuclear power plant portal and the Windows system was simulating a portal for the missile defense system. The objective was to get past the security of the two systems, obtain login passwords, and gain access to confidential information. The confidential data was protected with varying degrees of security.

 

After 5 hours, 10 out of 16 flags were captured but no one was successful in capturing the main flag. The main flag, on an unpatched Windows 2003 Server, was protected by...

pwadia | 28 Sep 2012 | 6 comments

Organizations utilize Symantec Critical System Protection to secure their physical and virtual data centers. Through a combination of host-based intrusion detection (HIDS), and intrusion prevention (HIPS), it allows organizations to proactively safeguard heterogeneous server environments and the information they contain. Unlike other technologies, Symantec Critical System Protection’s granular policy-based controls provide comprehensive protection for VMware vSphere, protection against multiple threat vectors including zero-day and targeted attacks, and real-time visibility and control into compliance.  With the latest release, Symantec Critical System Protection 5.2.9, a deeper integration with VMware and ease-of-use enhancements enable organizations to protect against risks targeted at virtualized environments. With the new release of Symantec Critical System Protection 5.2.9, organizations can:

  • Protect and Monitor VMware...
colingibbens | 13 Aug 2012 | 8 comments

 

Another year, another exciting Black Hat Conference.  For the second consecutive year, Symantec challenged conference attendees to “Capture the Flag.”  While Symantec ran several smaller contests, the main event was run by placing a flag on an unpatched Windows 2003 server running several vulnerable applications, protected by Symantec solutions.  After two days of attempts by more than 50 skilled hackers, the Symantec protected systems remained hack-proof.

So what prevented some of the best in the world from prevailing?  Symantec Critical System Protection and Symantec Endpoint Protection.

  • Symantec Critical System Protection secured the system by sandboxing the OS and applications. The attacks known or unknown that were thrown at the box were contained and jailed from accessing resources on the system. The flags were locked down to only allow authorized access to the data.  
  • Symantec Endpoint...