Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Security Blog
Showing posts in English
piero_depaoli | 01 Oct 2013 | 1 comment

Every day we’re bombarded with news about the latest data breach. Unfortunately, the headlines we all read confirm findings in Symantec’s recent Internet Security Threat Report: the threat from hackers is not only growing but evolving.  Today’s cybersecurity landscape requires more than antivirus; advanced malware protection requires up-to-date technology with the ability to stop unknown threats. In fact, Symantec’s research showed that 51 percent of threats blocked by Symantec Endpoint Protection were stopped by technologies other than antivirus in 2012. Clearly, AV alone is not enough, and neither is outdated protection.

For customers to truly leverage their full security investment, it’s imperative that they upgrade to the latest, most robust product...

Sara Pan | 30 Sep 2014 | 1 comment

Today, Symantec released Symantec Endpoint Protection 12.1.5, which includes significant feature enhancements in terms of performance and management.

Overview

Last year, Symantec saw a 91% increase in targeted attack campaigns, which lasted an average of three times longer than in 2012. For those in the security industry, it should come as no surprise that these sophisticated threats are not stopped by antivirus alone. Protection requires leveraging the collective wisdom of the world’s largest Global Intelligence Network (GIN), with data from hundreds of millions of users and sensors across Symantec’s network to stay of today’s mutating malware.

Derived from GIN and stronger than ever, the unique InsightTM technology in Symantec Endpoint Protection 12.1 blocks new and mutating threats and enables faster scan times by accurately identifying file reputations and scanning only at-risk files. Meanwhile, SONARTM stops zero-day threats by monitoring...

Suzanne Konvicka | 29 Sep 2014 | 0 comments

costofdatabreach.pngIf it seems as if every week there is another story in the news about a data breach, you aren’t mistaken. Around the world, companies are experiencing an unprecedented number of data breaches and cyber-attacks. According to Symantec’s Internet Security Threat Report, the total number of breaches in 2013 increased by 62 percent compared to 2012 with 253 total breaches, at least eight of which exposed more than 10 million identities. In total, over 552 million identities were breached...

piero_depaoli | 02 Jun 2014 | 0 comments

The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities.

While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?”

As a worldwide leader in information protection, Symantec not only has a comprehensive suite...

Morgan Hudson | 30 May 2014 | 0 comments

BYOD.jpegThe consumerization of IT isn’t new. It’s been infiltrating organizations and breaking down B2C and B2B barriers for over a decade now. Cloud-based email, social networks, and instant messaging were all introduced from the outside in.  We can even thank consumers for smuggling in those emoticons we see peppered throughout our daily communications :).

IT departments must embrace these mini-uprisings and harness the power of their own corporate crowdsourcing. Just like how local governments started building skateboard parks for the disgruntled youth to negotiate 180 fakie kickturns rather than scuff up bank benches or Mayor Quimby’s bust, more and more IT groups are embracing this inevitable change. 

For example, many traditionally close-to-the-vest companies are opening up their own physical IT “stores” to better connect...

Kari Ann | 25 Apr 2014 | 3 comments

As you may already know, Microsoft has officially ended support for Windows XP. (You can access the official Microsoft announcement here: http://www.microsoft.com/en-us/windows/endofsupport.aspx)

If you are a Symantec Endpoint Protection customer who uses machines running on Windows XP, you may wonder how this will impact your protection and system security. This post covers a few important things we think you should know.

  1. Do I need to move to a new operating system?

Yes! We want you to be as secure as possible and the best way to do that is to migrate to a fully supported Microsoft operating System. Attackers will continue to find exploits they can leverage to gain access to your systems. While Symantec solutions will protect you from new and emerging threats, ultimately a strong security strategy includes adopting the latest operating system and security...

Symantec Corp. | 04 Mar 2014 | 7 comments

The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, approximately 30 percent of desktop operating systems still run on Windows XP today and could be left vulnerable after April 8. 

At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your enterprise’s information, systems and devices. However, even the best security products can’t fully protect an outdated operating system. XP users will face increased risks after April 8 as cybercriminals try to take advantage of vulnerabilities. 

Symantec’s security solutions will...

tknorr | 13 Feb 2014 | 18 comments

BCS SECURITY NEWSFLASH.jpg

Symantec Product Security has posted SYM14-004 - Product Security Advisory for Symantec Endpoint Protection Management Vulnerabilities

 

  • A Security Advisory has been posted.
     
  • This is a High Severity Advisory which identifies multiple vulnerabilities in the Symantec Endpoint Protection Manager.
    A BCS Bulletin is being sent.
     
  • While there are no known exploits taking advantage of this vulnerability, Symantec is urging all customers to update their managers to the latest version, Symantec Endpoint Protection Manager 12.1 RU4a, as soon as possible. Clients are not affected and do not need to be updated. As part of normal best practices, Symantec strongly recommends keeping all operating systems and applications updated with the latest vendor patches.  ...
khaley | 22 Jan 2014
SEP12-v3.jpegA cash register was part of the Internet of Things long before there was an Internet of Things.  
 
A cash register, or Point Of Sale (POS) system, is a device that contains an operating system and network connectivity. It performs a very specific task, sending data back to a central server. Put that way, it sounds very much like part of the Internet of Things (IoT).
 
The big difference between POS and “IoT” is that devices in the “new” Internet of Things tend to run some flavor of Linux, while many cash registers run some version of the Windows operating system. As such, these cash registers are susceptible to the millions of pieces of  malware written for Windows.  
...
khaley | 19 Nov 2013 | 4 comments

It’s called the Halo Effect. iPods and iPhones created a “halo” that drove sales of Macs to business users. I noticed it a couple years ago, as I watched the number of Macs sitting around the conference room table began to grow. There got to be lots of those silver rectangles, with the glowing white apple, sitting on the table. Apple reported 50 percent growth in Mac sales to businesses in Q4 2013. But as more of us are using Macs for business, some common misperceptions about Mac security persist. What do organizations need to know?

Cybercriminals always focus their efforts where they see the most “bang for their buck” – the larger PC market. It’s a game of numbers – hackers go after what will give them the greatest return on investment. Up to this point, that’s been targeting Windows systems. While the volume of malware targeted at Macs is still low...