Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Security Blog
Showing posts in English
khaley | 22 Jan 2014
SEP12-v3.jpegA cash register was part of the Internet of Things long before there was an Internet of Things.  
 
A cash register, or Point Of Sale (POS) system, is a device that contains an operating system and network connectivity. It performs a very specific task, sending data back to a central server. Put that way, it sounds very much like part of the Internet of Things (IoT).
 
The big difference between POS and “IoT” is that devices in the “new” Internet of Things tend to run some flavor of Linux, while many cash registers run some version of the Windows operating system. As such, these cash registers are susceptible to the millions of pieces of  malware written for Windows.  
...
khaley | 19 Nov 2013 | 4 comments

It’s called the Halo Effect. iPods and iPhones created a “halo” that drove sales of Macs to business users. I noticed it a couple years ago, as I watched the number of Macs sitting around the conference room table began to grow. There got to be lots of those silver rectangles, with the glowing white apple, sitting on the table. Apple reported 50 percent growth in Mac sales to businesses in Q4 2013. But as more of us are using Macs for business, some common misperceptions about Mac security persist. What do organizations need to know?

Cybercriminals always focus their efforts where they see the most “bang for their buck” – the larger PC market. It’s a game of numbers – hackers go after what will give them the greatest return on investment. Up to this point, that’s been targeting Windows systems. While the volume of malware targeted at Macs is still low...

Spencer Parkinson | 02 Oct 2013 | 1 comment

Information Security™ magazine and SearchSecurity.com recently announced the winners of its 2013 Reader’s Choice Awards, which were selected based on feedback by customers who were asked to assess products deployed within their organizations. We’re excited to announce that Symantec was honored with eight awards – four Gold, two Silver and two Bronze –demonstrating significant representation across our diverse portfolio of market-leading security solutions.

Included below is a complete list of Symantec’s wins, which will be featured in the October edition of Information Security magazine and are highlighted online at SearchSecurity.com.

The Information Security magazine and SearchSecurity.com 2013 Readers’ Choice Award winners were selected based on extensive, in-depth discussions and...

mmarfise | 29 Jul 2013 | 1 comment

Not too many years ago, a camera was a single, discrete piece of equipment developed to do one thing--take pictures. For the most part, it fulfilled the need well. But over the last decade, we've seen an unprecedented integration of photographic and other useful technologies into a single device – today's smartphone. Now we not only have the ability to record photos and video with a moment's notice, we can even send pictures digitally to friends and family in real time, from the same device.

Technology continually evolves. Case-in-point...do you expect the same clarity from your 1.3-megapixel camera phone from 2007 that you require from today’s smartphone? Of course not. Unfortunately, it’s not just legitimate businesses making technological improvements to their products. Cybercriminals are also evolving and cooking up new ways to steal information from businesses and wreak havoc on individual machines and entire networks. As a result, security...

Neelum | 29 Jul 2013 | 1 comment

The latest release of Symantec Critical System Protection, 5.2.9 MP3, further expands its server security platform support to:

•  Windows Server Core 2008, 2012

•  Windows Embedded POSReady7

•  SUSE Linux Enterprise Server 11 SP3  (32-bit and 64-bit) 

See Symantec Critical System Protection Platform and Feature Matrix for details on specific platforms, version, and the features they support. 

For more information on policy-based server security from Symantec go to: 
http://www.symantec.com/critical-system-protection  

Duncan Mills | 02 May 2013 | 0 comments

The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost benefits. However, it also presents a number of complex challenges related to security.

Due to the rise of smart media devices like smartphones, tablets and ultrabooks, it is estimated that potentially, as many as 30-35%* of endpoints connected to a company’s network could be unmanaged. These are more at risk than managed endpoints which are typically subject to software patching and endpoint security policies.

Of course unmanaged endpoints are still protected by your perimeter security, such as secure web gateways. However, these have typically evolved from caching proxies and URL filters. What you need is an additional layer of security that provides the best possible levels of protection for unmanaged endpoints.

Symantec Web Gateway (SWG) will...

Neelum | 01 May 2013 | 0 comments

According to the 2013 Verizon Breach Report data breaches affect organizations of all sizes, across all sectors with 92 percent of them attributable to outsiders and 14 percent committed by insiders.  What are your top security concerns? We want to hear from you! Answer 7 questions and receive a personalized scorecard with recommended next steps: https://scm.symantec.com/critical-system-protection-survey/en/

Look forward to your responses. 

Thanks for reading!
Neelum 

Neelum | 29 Mar 2013 | 0 comments

The latest release of Symantec Critical System Protection, 5.2.9 MP2, includes expanded platform support and ease-of-use enhancements to further simplify intrusion prevention. 

Expanded platform support: In 5.2.9 MP2, Symantec Critical System Protection extends support to Oracle Linux 5.8, 5.9 and 6.3 64 bit with Unbreakable Enterprise Kernel Release 2. This release also adds platform support for RedHat Enterprise Linux 6.4 64 bit. For more information on specific platforms, versions and the features they support, see Symantec Critical System Protection Platform and Feature Matrix.

Ease-of-use enhancements: The console has been updated to allow users to select multiple prevention custom policies and apply them to a group, further simplifying policy management and intrusion prevention.

For more information about Critical...

mmarfise | 08 Feb 2013 | 0 comments

The first focus at Symantec is on our customers and keeping them protected. Constant research and innovation are required to help organizations stay ahead of today’s modern malware. We also work closely with top research firms to make sure we’re addressing key market concerns. We believe that analysts are a fantastic resource to aggregate customer feedback, and we also believe that they represent the voice of potential customers. Firms like Forrester Research, Inc., let us know when we need to improve and when we’re getting it right. With that in mind, I’m very pleased to share The Forrester Wave™: Endpoint Security, Q1 2013.

Forrester Research positioned Symantec as a leader in The Forrester Wave: Endpoint Security, Q1 2013 report published in January 2013 by Chenxi Wang and Chris Sherman. Forrester employs a rigorous process to create a Forrester Wave that employs a...

Neelum | 10 Jan 2013 | 0 comments

Why is server security different from other endpoint security? If you’re considering a solution to protect one or all of the endpoints in your environment, it's important to understand the security requirements for laptops and desktops, how they differ from servers, and why servers have greater needs for security and compliance. 

Symantec partnered with eWeek to create Security Differentiators for Servers, Laptops: 10 Best Practices. Read about the best practices here: http://www.eweek.com/security/slideshows/security-differentiators-for-servers-laptops-10-best-practices/

Thanks for reading!

-Neelum