Video Screencast Help
Security Community Blog
Showing posts tagged with Data Loss Prevention (Vontu)
Showing posts in English
Vikram Kumar-SAV to SEP | 04 Feb 2013 | 0 comments

Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12..

When we had SAV in the market what our customer needed was just a Antivirus to protect their system from downtime..here antivirus was looked more as a Availability facilitator than a core security product..till early 2000.

Even though we had SCS (firewall and IPS) seclected people used the other features.

Starting from 2006-2007 that was a high rise in malware being created and vulnerabilities being exploited..slowly the trend changed and it all came down to money making malwares..

FakeAntivirus, Downadup, Various Blackmailing Trojans etc..here the audience was not high profile..and SEP 11 very well detect and blocks and does whatever it can..Slowly people started using IPS, ADC and found much more can be done with SEP and they are doing it..

However in last few years there has been targetted...

Al Cooley - DeepSight Product Management | 29 Jan 2013 | 0 comments

There has been a data explosion within security teams, as organisations everywhere seek to increase their effectiveness in preventing breaches of defences through improved correlation and data sharing. You have probably seen this happening within your own working environment, too.

In the quest to achieve this sought-after level of ‘good enough’ security, the findings of new research from the Enterprise Strategy Group, ‘Big Data Intersection with Security Analytics’, partially sponsored by Symantec, are encouraging.

You won’t be too surprised to hear that, in our ‘Big Data’ world, we are collecting a lot more data than we used to two years ago. There is only one direction in which that arrow is going to be pointing from now on. What is interesting here, though, is that lots of people are vested in this information to do their job – and that is likely to envelop even more people, across a wide range of roles over the next...

jjesse | 14 Jan 2013 | 0 comments

I have been using Evernote for awhile but was recently introduced with the Chrome extension Evernote Clipper and this has changed how I browse the web and more importantly how I browse Symantec Connect.  So I started clipping various blog entries, articles and other information stored on the site to save for later.  In order to help share this information I will be creating a round up of various posts I've found interesting or important and post them to both my blog and also Symantec Connect.  Since I'm focusing on Symantec Security this year, these posts will be filed under the security portion of Connect.

So let's get started on Round Up #1 (maybe 1 day I'll come up with a better name or title)

  • ...
Pamela Reese | 06 Dec 2012 | 0 comments

Symantec received a finalist nomination in 9 categories of the upcoming SC Magazine 2013 Awards, representing Symantec's broad portfolio of superior security offerings. SC Magazine will announce the winners at a dinner event during RSA 2013. Symantec looks forward to attending!

Deb Banerjee | 16 Nov 2012 | 0 comments

Amazon Web Services (AWS) clouds offer a variety networking security controls for segmenting and isolating EC2 instances running in that cloud. These controls address the following use cases

  1. Isolate EC2 instance from the public internet. E.g make those instances unaccessible from the public internet.
  2. Isolate EC2 instance belonging to an Enterprise from other EC2 instances belonging to other tenants.
  3. Within a tenant, isolate applications and departments from one another. This can be also be used to isolate application tiers from one another.
  4. Isolate applications and application tiers from one another within a tenants AWS network..

AWS Network Security Constructs

AWS offers a variety of networking constructs to implement these controls. These include VPC's, Gateways(Internet and VPN), NAT, Subnets, Routes, Security Groups and Elastic IP's.  These objects would be used to implement the above controls as...

Pritesh J. Chauhan | 11 Oct 2012 | 0 comments

Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.

When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends. 

Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks. 

One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could enforce this order, but what was actually happening is...

Elspeth Magoria | 06 Sep 2012 | 0 comments

Join Symantec and Washington University at the St. Louis Symantec $25k Cyber Security Challenge. This one-of-a-kind event invites security professionals and ethical hackers like yourself to help further improve current security technologies and solutions.

Come learn about the current global threat landscape and IT trends requiring organizations to take new approaches in security – cloud, mobility, compliance, etc.

Stay for the "Challenge", an exciting cyber "Capture the Flag" (CTF) simulation. Take part for a chance to win cash and prizes! And don't miss the Hands-On Security Demo Lab that will showcase current security solutions around mobile, data loss, encryption, email and web security and more.

Be There To Win - All registered attendees get a $50 Amazon.com Gift Card and if you refer two friends and they attend...

Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
 
Here's the Link to see the Archived Version: https://www2.gotomeeting.com/register/430279362 or go to our website at www.xcendgroup.com  to see all of the archived,...
JDrain | 16 Jul 2012 | 0 comments

User Group Memebers,

Please note the attached presentation.

linda_park | 05 Jun 2012 | 0 comments

In an effort to understand how data loss prevention is affecting the role of security executives, Symantec is conducting a research study with a select group of Symantec/Vontu DLP customers.  

If you were involved in the selection of DLP at your company, you will qualify!  

The survey will take about 10 minutes. In appreciation for your participation, we will give you the option to receive a $50 gift card for Amazon.com

To be invited to participate in the survey, please send your name, title and work email address to linda_park@symantec.com by Friday, June 8, 2012 at 12 pm PDT.  

Sincerely,

Linda Park

Sr. Product Marketing Manager | Data Loss Prevention | Symantec

415.829.5046 | go.symantec.com/dlp | ...