Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrade.
Please accept our apologies in advance for any inconvenience this might cause.

Security Community Blog

Showing posts tagged with Data Loss Prevention (Vontu)
Showing posts in English
JDrain | 16 Jul 2012 | 0 comments

User Group Memebers,

Please note the attached presentation.

linda_park | 05 Jun 2012 | 0 comments

In an effort to understand how data loss prevention is affecting the role of security executives, Symantec is conducting a research study with a select group of Symantec/Vontu DLP customers.  

If you were involved in the selection of DLP at your company, you will qualify!  

The survey will take about 10 minutes. In appreciation for your participation, we will give you the option to receive a $50 gift card for Amazon.com

To be invited to participate in the survey, please send your name, title and work email address to linda_park@symantec.com by Friday, June 8, 2012 at 12 pm PDT.  

 

Sincerely,

Linda Park

Sr. Product Marketing Manager | Data Loss Prevention | Symantec

415.829.5046 | go.symantec.com/dlp | ...

BJT | 04 Jun 2012 | 0 comments

At this time, Flamer seems to have targeted only a few hundred organizations and individuals located in a small segment of the globe. But make no mistake; Flamer is important worldwide.  The complexity of the code within Flamer is on par with that seen in Stuxnet; arguably the most complex piece of malware Symantec has analyzed to date.  However the mission of Flamer is much different from that of Stuxnet, which was designed to deliver a payload that disrupted the systems it was targeted toward.  Symantec and others’ research indicates that Flamer, as of this moment; is purely focused on capture and exfiltration of sensitive information.
   
The good news for our public sector customers is that Symantec has protections in place to detect this threat (W32.Flamer). Specifically, we have:

  • AntiVirus, AntiSpyware, IPS component, Symantec Insight, and Heuristics detection and conviction measures in Symantec Protection Suite...
Mira Davda | 29 May 2012 | 0 comments

Augmented by broadband penetration smaller and emerging cities of India are exploring opportunities offered by the virtual world. This group of connected people and businesses has reached critical mass and is lucrative enough to be targeted by cyber criminals.

Indian Cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly facing the risk of cyber attacks, with one in four bot- infections in India reported in such cities, reveals India findings of Symantec Internet Security Threat Report, Volume (ISTR) 17. Also, some cities that repeatedly appear in the list for origin of phishing in India - Ahmedabad,  Nashik and Coimbatore also figure in the list of bot-infections.  Botnets are networks of zombie machines that are used to perform sophisticated attacks  and conduct coordinated attacks. The presence of bot-infected computers in these locations indicates that they are being inducted as part of a network of compromised...

Mira Davda | 25 May 2012 | 0 comments

The value of data is appreciating, especially with organizations rapidly  adopting  new technologies to provide access to business information anywhere, at any time. This means threats to data or information translate into business risks to business. These risks, related to reputation, customer loyalty, finance and legal, are not only serious but also quantifiable.   The first benchmark Cost of Data Breach Study in India, conducted by the Ponemon Institute on behalf of Symantec, revealed that the average organizational cost of a data breach in India is INR 53.4 million (53.4 crore), with malicious breaches by hackers or criminal insiders being the most expensive type at INR 4,224 for one compromised record. 

The report further components of the total cost: detection, escalation and redressal formed a significant component, averaging INR 16.4 million (1.64 crore) and INR 20.9 million (2.09 crore) respectively. Victims lost INR 14.6 million (1.46 crore...

Srikanth_Subra | 02 May 2012 | 0 comments

Hi

Now a days the data theft is increasing in many organizations which leads to loss of data in turn business.

we can follow the below ways to protect our data which is the valuable resource

1. While we are using any DLP Solutions we can assign least permissions in policies

2. We can restrict the permissions to the important files which we are using based on user level

3. We can use the encryption solutions like PGP encryptions

4. We can restrict the use of removable media like USB and other devices

5. We need to monitor and audit the file transfer sites

6. We need to create security controls if systems are connecting to Wireless

By using the above ways we can still keep in control the data theft.

JDrain | 27 Apr 2012 | 0 comments

Thank you for expressing interest in providing us with feedback on DLP while at Vision!

We have several exciting feedback opportunities specific to DLP at Vision this year.  By participating you’ll have the chance to influence how the product is developed and to make sure that the requirements of your company are well understood.

 

During each session, you can expect to be asked some background questions about your role and your use of DLP.  We will also show you some mockups to gather your feedback as well as give you the chance to ask questions of a product expert.

 

As thanks for your participation, and if permissible by your company policy, we will offer you a $75 gift card redeemable at a host of online vendors. 

 

DLP Usability Activities at Vision

01. Malicious Insider Usability 1:1s | Duration: 60 minutes

  • Topic...
JDrain | 25 Apr 2012 | 0 comments

Good meeting all.

We recieved a presentation from Chirag Shah on the lessons learned from his upgrade at eBay. Also, Mario Espinoza gave us some insight into existing and upcoming feature sets, including DLP for Tablets.

Some of the slides are attached to this post.  There will be more to follow.

Congrats to Visa on winning the door prize.

gschumm | 17 Apr 2012 | 0 comments

Last year, there were nearly 900 data breaches (more than in 2009 or 2010*), resulting in 31 million records breached**. And, as the number of reported breaches continued to rise, organizations paid a hefty cost for data breaches, according to this year’s Cost of a Data Breach Study. Some interesting facts from the 2011 study:

  • The organizational cost of a data breach was $5.5 million
  • The cost per lost or stolen record was $194
  • Negligence was the root cause of 39 percent of the data breaches, while malicious attacks caused 37 percent of data breaches (up 6 points from 2010)
  • For the first time, malicious attacks accounted for more than a third of breaches; they also remain the most costly type of breach at $222 per compromised record
  • Data-stealing malware is the leading attack type at 50 percent
  • The second most common type of malicious attack comes from within the...
Beverly van de Velde | 29 Mar 2012 | 0 comments

Education Enablement Services is developing a Symantec Cloud Security Essentials course that combines the CSA training in order to achieve the CCSK credential & a Symantec Certified Professional (SCP) in Cloud Security credential. 

This is an open call for your experiences with reviewing, designing, or implementing security solutions in a cloud environment.  These could come from situations unique to the cloud (ex. compliance issues for systems in a public cloud) - OR - general security solutions addressed in cloud environments (ex. how existing encryption policies were applied to a cloud architecture). 

We need your:
• Specific examples of security solutions in cloud environments
• Example cloud architectures – good or bad – implemented by customers
• Key questions, challenges, and concerns from customers migrating their infrastructure to...