Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrades.
Please accept our apologies in advance for any inconvenience this might cause.

Managed Security Services Blog

Showing posts tagged with Endpoint Protection (AntiVirus)
Showing posts in English
Sdesc | 15 Apr 2014 | 0 comments

Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these threats and learn which immediate steps you need to take to help defend your organization.

uuallan | 16 Jun 2011 | 0 comments

The current mantra from most business experts seems to be that your organization has to have a social media strategy.  They say you must have a regularly maintained Facebook Page, you must Twitter regularly and you should be using as many social media tools to reach your audience as possible.  If you Google the phrase “social media strategy” you’ll return more than 8.5 million hits.  What no one talks about is the necessary steps to ensure the security of your social media presence.

It is not enough to have a social media strategy, you must also have a social media security strategy, and that security must be interwoven into every aspect of your organization’s social media presence. 

The fact is, the more social media exposure your organization has the more your security risk increases.  Social media sites are a prime research vehicle and target for today’s attackers, and the more your organization...

dstuart | 28 Feb 2011 | 0 comments

by David Stuart, Manager of Symantec MSS Product Marketing

Another RSA conference has come and gone so it feels appropriate to take a moment and summarize significant experiences from the event.   Overall, the conference activity level was busy as ever and seemed to match or surpass its former heydays – hopefully a sign of our strengthening economy.  Highlights of the week for Symantec and MSS were;

  • Symantec Managed Security Services (MSS) had its own demo/display area and over 100 customers/prospects stopped by to learn more during the three expo days.  If you would like to download MSS or other Symantec literature, visit the Symantec RSA Collateral Resource Center
     
  • Symantec launched the beta of Symantec Endpoint Protection 12, which will provide the only reputation-based security solution that is context-aware. With SEP 12,...
GGeyer | 14 Feb 2011

Welcome to the new Managed Security Services Blog!
by Grant Geyer, VP Global Managed Services

Welcome to the Symantec Managed Security Services (MSS) blog!  As practitioners are fully aware, while more and more of our critical assets are moving online, the threat landscape is bad and getting worse as threats are stealthy and hard-to-detect, motivated by financial gain.  Now more than ever, having  real-time awareness of threats, vulnerabilities, and an understanding of the impact of security incidents are key to an effective risk mitigation program.  Through our MSS blog, we will provide insight into how organizations such as yours can improve security effectiveness and enhance efficiency of security operations via a managed services model.  Contributing Symantec security experts will share their thoughts and experiences on how best to protect IT assets, people and information in the rapidly evolving threat environment. ...

symc_seanm | 13 Feb 2011

In spite of mounting evidence to the contrary, many of the enterprise security leaders with whom I speak seem to still be living in a world where the greatest threat to their enterprise was the “hacker” trying to breach their firewall.  When the MSSP industry was born in the late 90’s, this may have been the case.  The entire industry rose in part as a result of the development of intrusion detection (IDS) technologies.  The earliest IDS sensors were signature-based and focused on, as the name implies, detecting intrusions to the network.  Because many enterprises were ill-prepared to deal with the volume of alerts and high rate of false positives, Managed Security Service providers emerged to provide a means to validate and evaluate the alerts generated by these sensors.  Over time, the IDS industry matured to incorporate technologies such as protocol anomaly...