Video Screencast Help
Managed Security Services Blog
Showing posts tagged with Email Security.cloud
Showing posts in English
uuallan | 16 Jun 2011 | 0 comments

The current mantra from most business experts seems to be that your organization has to have a social media strategy.  They say you must have a regularly maintained Facebook Page, you must Twitter regularly and you should be using as many social media tools to reach your audience as possible.  If you Google the phrase “social media strategy” you’ll return more than 8.5 million hits.  What no one talks about is the necessary steps to ensure the security of your social media presence.

It is not enough to have a social media strategy, you must also have a social media security strategy, and that security must be interwoven into every aspect of your organization’s social media presence. 

The fact is, the more social media exposure your organization has the more your security risk increases.  Social media sites are a prime research vehicle and target for today’s attackers, and the more your organization...

GGeyer | 14 Feb 2011

Welcome to the new Managed Security Services Blog!
by Grant Geyer, VP Global Managed Services

Welcome to the Symantec Managed Security Services (MSS) blog!  As practitioners are fully aware, while more and more of our critical assets are moving online, the threat landscape is bad and getting worse as threats are stealthy and hard-to-detect, motivated by financial gain.  Now more than ever, having  real-time awareness of threats, vulnerabilities, and an understanding of the impact of security incidents are key to an effective risk mitigation program.  Through our MSS blog, we will provide insight into how organizations such as yours can improve security effectiveness and enhance efficiency of security operations via a managed services model.  Contributing Symantec security experts will share their thoughts and experiences on how best to protect IT assets, people and information in the rapidly evolving threat environment. ...

symc_seanm | 13 Feb 2011

In spite of mounting evidence to the contrary, many of the enterprise security leaders with whom I speak seem to still be living in a world where the greatest threat to their enterprise was the “hacker” trying to breach their firewall.  When the MSSP industry was born in the late 90’s, this may have been the case.  The entire industry rose in part as a result of the development of intrusion detection (IDS) technologies.  The earliest IDS sensors were signature-based and focused on, as the name implies, detecting intrusions to the network.  Because many enterprises were ill-prepared to deal with the volume of alerts and high rate of false positives, Managed Security Service providers emerged to provide a means to validate and evaluate the alerts generated by these sensors.  Over time, the IDS industry matured to incorporate technologies such as protocol anomaly...