Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Security Blog
Showing posts in English
pwadia | 11 Dec 2012 | 0 comments

With the latest release of Symantec Critical System Protection 5.2.9 MP1, organizations can address the needs of older Windows 32-bit platforms that are vulnerable to advanced memory attacks. The Memory Control feature in this release allows you to combat these advanced memory attacks, like reflective DLL injection.

Memory Control is another layer in Critical System Protection’s defense-in-depth approach to security that allows you to:

  1. Protect your critical systems from memory-based attacks, such as memory injections and in-memory executables  
  2. Stop malicious code from being loaded and executed within the memory space of core system services
  3. Prevent malware from using in-memory manipulation techniques within an exploited process

The Symantec Critical System Protection 5.2.9 MP1 release also includes expanded platform support for Windows 7 Embedded (32-bit and 64-bit).

For more information about Critical...

mmarfise | 03 Dec 2012 | 5 comments

In the 16 months since its initial release, Symantec Endpoint Protection 12 has been deployed on more than  8.5 million endpoints…Symantec’s fastest adoption of an enterprise security solution. Customers tell us they’re moving to it because migration is easy and because our Insight and SONAR technologies deliver powerful protection. Even recent unsponsored tests by Dennis Labs illustrate that Symantec Endpoint Protection offers the highest accuracy ratings in the industry for stopping malware. So, what next?

Today we’re delivering new features that expand the protection of virtual environments, increase security effectiveness, improve management and broaden platform support.

Symantec Endpoint Protection 12 now allows seamless protection for VMware environments through integration with VMware vShield Endpoint. By integrating with vShield...

asjr3 | 03 Dec 2012 | 1 comment

This week Symantec began shipping the next release of Symantec Endpoint Protection 12.1 which is an endpoint security solution optimized for use in virtual environments.  There are now 4 companies shipping a total of 5 endpoint security solutions for virtual environments.  Trend Micro has OfficeScan with a plug-in along with Deep Security Agentless Protection, McAfee Management for Optimized Virtual Environments (MOVE), and now Kaspersky has a product called Kaspersky Security for Virtualization.

We wanted to see how Symantec compared to these other solutions so we tested them for both performance and effectiveness and the results are very interesting.

Reports Discussed:

Dennis Labs –Virtual Desktop Anti-malware Protection, May 2012

Tolly Enterprises –...

Pamela Reese | 03 Dec 2012 | 0 comments

By Feris Rifai, Founder and CEO of Bay Dynamics

As a Symantec technology partner, one of the trends that continues to persist among our customers is the growing adoption of virtualization technology. Virtual servers and desktops are becoming more than just a novelty; they are changing the way businesses function. With a vast amount of benefits – including cost-savings and greater efficiency -- more and more businesses are increasing their investment in virtualization deployments. The bottom line is -- it is critical for our business that we offer products and services that help our customers maintain their security posture while continuing to evolve and adopt new technologies in order to meet growing customer demand.

Virtualization presents a particular challenge as businesses are looking to secure both physical and virtual environments simultaneously; previously, this would require...

pwadia | 05 Nov 2012 | 4 comments

As the security landscape evolves, risk increases. Sealed Air Corporation needed to protect their information and identities, while providing a strategic proactive security solution with endpoint proliferation. To tackle this issue, Sealed Air Corporation turned to Symantec. Both Symantec Endpoint Protection and Symantec Critical System Protection were utilized to provide a broad set of risk management in several ways. Benefits included:Integrated endpoint security, high system uptime, and support within their virtualized environment. To learn more about how Symantec and Sealed Air Corporation teamed up to manage risk, check out this video http://bit.ly/TmtgdA

 

Due to the extent of virtualization in their data center, the Sealed Air team also plans to add Symantec Critical System Protection.  Within the year, it will be rolled out across a segment of Sealed Air’s more than 1,000 physical and...

pwadia | 16 Oct 2012 | 0 comments

Symantec and Wincor Nixdorf have announced a new partnership, with the aim of making self-service banking solutions from different vendors all over the globe even more secure. Core components of Symantec Critical System Protection and Wincor’s Intrusion Protection will protect systems from digital sabotage and unauthorized attacks from outside.

 

“Cyber attacks today are carried out with ever greater precision and are easier than ever to launch, as Symantec’s Internet Security Threat Report Volume 17 shows this year. Financial institutions are popular, highly profitable targets, so it is vital that they make considerable efforts to protect the information andassets of their customers from theft,” explains Doug Bowers, Vice President of Engineering at Symantec: “By cooperating with a leading IT solution provider for retail banking and adapting the solution...

pwadia | 16 Oct 2012 | 0 comments

In the third Symantec Cyber Security Challenges, more than a hundred seasoned hackers and security professionals came out to Washington University in St. Louis on 9.12.2012.  The “challenge” included an exciting cyber “Capture the Flag” simulation and the chance to win $20,000.  The hackers were presented with a challenge to gain access to key data on two systems (Linux and Windows) with confidential information.  The Linux system was simulating a nuclear power plant portal and the Windows system was simulating a portal for the missile defense system. The objective was to get past the security of the two systems, obtain login passwords, and gain access to confidential information. The confidential data was protected with varying degrees of security.

 

After 5 hours, 10 out of 16 flags were captured but no one was successful in capturing the main flag. The main flag, on an unpatched Windows 2003 Server, was protected by...

pwadia | 28 Sep 2012 | 6 comments

Organizations utilize Symantec Critical System Protection to secure their physical and virtual data centers. Through a combination of host-based intrusion detection (HIDS), and intrusion prevention (HIPS), it allows organizations to proactively safeguard heterogeneous server environments and the information they contain. Unlike other technologies, Symantec Critical System Protection’s granular policy-based controls provide comprehensive protection for VMware vSphere, protection against multiple threat vectors including zero-day and targeted attacks, and real-time visibility and control into compliance.  With the latest release, Symantec Critical System Protection 5.2.9, a deeper integration with VMware and ease-of-use enhancements enable organizations to protect against risks targeted at virtualized environments. With the new release of Symantec Critical System Protection 5.2.9, organizations can:

  • Protect and Monitor VMware...
colingibbens | 13 Aug 2012 | 8 comments

 

Another year, another exciting Black Hat Conference.  For the second consecutive year, Symantec challenged conference attendees to “Capture the Flag.”  While Symantec ran several smaller contests, the main event was run by placing a flag on an unpatched Windows 2003 server running several vulnerable applications, protected by Symantec solutions.  After two days of attempts by more than 50 skilled hackers, the Symantec protected systems remained hack-proof.

So what prevented some of the best in the world from prevailing?  Symantec Critical System Protection and Symantec Endpoint Protection.

  • Symantec Critical System Protection secured the system by sandboxing the OS and applications. The attacks known or unknown that were thrown at the box were contained and jailed from accessing resources on the system. The flags were locked down to only allow authorized access to the data.  
  • Symantec Endpoint...
mmarfise | 14 Jul 2012 | 0 comments

Updated July 16th, 2012 10:30 AM PST:  Additional details provided on confirmed examples where we have seen the blue screen issue.

Updated July 31st, 2012 1:36 PM PST: Issue was also experienced on Windows Server 2003 and has been confirmed by Symantec.

What Happened?

On July 11, 2012 at approximately 10:30 PM PT, Security Response started receiving reports of customers experiencing blue screens on Windows XP and Windows Server 2003 machines after applying definitions July 11th revision 18 and SONAR definitions July 11th rev11. This update only contained signature updates and no change to the SONAR driver.

The problem has been identified as a compatibility issue in SONAR definitions released July 11th at 6:25PM PT. Once the cause of the issue was discovered, the signature was...