Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Security Blog
Showing posts in English
mmarfise | 14 Jul 2012 | 0 comments

Updated July 16th, 2012 10:30 AM PST:  Additional details provided on confirmed examples where we have seen the blue screen issue.

Updated July 31st, 2012 1:36 PM PST: Issue was also experienced on Windows Server 2003 and has been confirmed by Symantec.

What Happened?

On July 11, 2012 at approximately 10:30 PM PT, Security Response started receiving reports of customers experiencing blue screens on Windows XP and Windows Server 2003 machines after applying definitions July 11th revision 18 and SONAR definitions July 11th rev11. This update only contained signature updates and no change to the SONAR driver.

The problem has been identified as a compatibility issue in SONAR definitions released July 11th at 6:25PM PT. Once the cause of the issue was discovered, the signature was...

mmarfise | 21 Oct 2011 | 11 comments

I'm pleased to announce the availability of the Symantec Endpoint Protection 12 mobile resource app – a guide for partners and end users alike to gain quick, easy access to installation and configuration information for Symantec Endpoint Protection12.1 and Symantec Endpoint Protection Small Business Edition 12.1 on the iPhone,iPad or Android device.

This app provides step-by-step installation instructions, access to frequently asked questions, as well as links to support and community resources to help users install and configure the fastest, most powerful endpoint protection security solution customers can buy. It also eliminates the need to print instructions or bring a laptop to a customer’s site by caching data for access even when offline.

We look forward to hearing your thoughts and getting your feedback for future updates to the application.

I invite you to download the mobile application today on...

CJ Desai | 04 Oct 2011 | 0 comments

We have exciting news about Symantec Endpoint Protection 12deployments in the field. We have now successfully deployed more than one million endpoints worldwide in the 86 days since the product became generally available on July 5, 2011. 37% of these endpoints are new installations, and 63% are migrations from previous versions of Symantec Endpoint Protection. The feedback from customers and partners, from small to large enterprise organizations, has been very positive. Many additional large customers plan to go live in the next few months based on this success and based on their testing of the product in their physical and virtual environments.

If you’re still using Symantec Endpoint Protection 11, it’s a great time to upgrade.  More than 1 million machines are already being protected, and...

CJ Desai | 30 Aug 2011 | 2 comments

2011 State of Security Report: 3,300 Companies Sound Off

Earlier today, we announced the findings of our 2011 State of Security Survey, which explored the state of cybersecurity efforts in organizations of all sizes. The findings of the survey* – based on 3,300 responses in 36 countries – reveals that (for the second year in a row) security is the leading business risk they face, ahead of traditional crime, natural disasters and terrorism. However, results from the survey also indicate that organizations are getting better at fighting the war against cybersecurity threats. While the majority of respondents suffered damages as a result of cyberattacks, more respondents reported a decline in the number and frequency of attacks compared to 2010.

The survey revealed additional positive findings. For example, 71 percent of organizations saw...

colingibbens | 19 Aug 2011 | 4 comments

Symantec’s powerful virtual and physical server security solution- Symantec Critical System Protection was recently put to the test at the Black Hatconference. Seasoned hackers from various world renowned groups tried but failed to capture a ‘flag’ that was hidden within an un-patched, vulnerable  Windows XP workstationprotected by Symantec Critical System Protection.

The aim was to have security professionals and hackers help us improve our product by pointing out existing gaps. The flag was secured using Critical System Protection’s strong prevention policies on a Windows XP un-patched workstation. The workstation had 10 known OS vulnerabilities reported by Rapid 7, was vulnerable to attacks and had open shares that allowed external access.

At any given point in time at least 10 different IP’s were attacking the box, with some IP addresses originating from other countries,...

khoi | 08 Jul 2011 | 0 comments

Summertime! That means sunshine, travel…and additional data threats to your smartphone. What’s that? You don’t consider mobile security risks and summertime as going hand in hand? Well, consider this: As you and your employees take some well-deserved time off, will you be taking smartphones with you? Of course you will. And chances are you will be accessing corporate data. In fact, a recent Symantec survey on security habits of mobile device users revealed that 62 percent of corporate smartphone users access sensitive corporate information while on vacation, and 81 percent will at least be checking their business email accounts.

With a variety of looming threats, from unsecured networks to malicious apps, corporate smartphone users should carefully consider what they can do to make sure a vacation from the office doesn’t turn into a vacation from security. The following best practices will help you keep mobile devices secure.

  • Use the...
dschrader | 05 Jul 2011 | 0 comments

This week, Symantec started shipping Symantec Endpoint Protection 12.1 - an endpoint security solution optimized for use in virtual environments.  Trend Micro and McAfee are also shipping security products for virtual environments. 3 different companies, 4 different solutions (Trend is shipping both Deep Security Agentless Protection and OfficeScan with a plug-in) – what’s the difference?

We were curious about the performance and effectiveness of competitive solutions – so we tested them.  The results were surprising.

Reports Discussed:

Dennis Labs - Virtual desktop malware defence, April 2011

Tolly Enterprises - Symantec Endpoint Protection 12.1 vs. McAfee and Trend Micro, Anti-virus Performance in VMware ESX Virtual Environments...

Hear4U | 17 Jun 2011 | 1 comment

It’s a fact! How we do business continues to change. We are used to being available anytime, anywhere and our personal technology must keep up with us. Gone are the days when we could get by with any mobile device available – we now need to have the capabilities of a PC at our fingertips.

Even though this availability provides convenience for our fellow employees and clients, it can sometimes come at a price. Businesses must not only have the best security in place for mobile devices, but also policies for protecting the data in the cloud.

With so much proprietary business information being accessed and stored on our mobile devices, it can often-times be difficult to know where to start when it comes to protecting and securely setting policies for the devices in the cloud. Here are a few tips on where businesses can start:

Take inventory – You can’t protect or manage what you can’t see. You must take inventory of...

Sean Yarger | 08 Jun 2011 | 2 comments

Let’s pretend for a moment that you’re on a business trip. You hear the boarding call for your flight and reach down to grab you laptop – only your laptop isn’t there. Whether it was left at security or snagged by another traveler in the terminal, your laptop is gone and your company data is at risk.

So what do you do? Typically you’ll need to make a call to the office, notifying your IT department of the incident. This call will initiate a chain reaction of events set into place to ensure measures are taken to secure the files and equip you with a new device to keep business running as usual. This process typically involves a series of forms, approvals, signatures, etc.

While it may sound simple, enforcing processes with effectiveness is one of hardest things for companies to do. With multiple people involved and steps required, any number of things can go wrong, slowing down the process – and costing you and your company...

Spencer Parkinson | 17 May 2011 | 0 comments

More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices – a trend known as the consumerization of IT. However, the conversation around the consumerization of IT almost always revolves around what IT departments think of this rapidly growing trend. So, Symantec recently conducted a short survey to learn more about end users’ experiences and perspectives on the consumerization of IT.                                                                           ...