Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Data Loss Prevention (Vontu)
Showing posts in English
Mira Davda | 25 May 2012 | 0 comments

The value of data is appreciating, especially with organizations rapidly  adopting  new technologies to provide access to business information anywhere, at any time. This means threats to data or information translate into business risks to business. These risks, related to reputation, customer loyalty, finance and legal, are not only serious but also quantifiable.   The first benchmark Cost of Data Breach Study in India, conducted by the Ponemon Institute on behalf of Symantec, revealed that the average organizational cost of a data breach in India is INR 53.4 million (53.4 crore), with malicious breaches by hackers or criminal insiders being the most expensive type at INR 4,224 for one compromised record. 

The report further components of the total cost: detection, escalation and redressal formed a significant component, averaging INR 16.4 million (1.64 crore) and INR 20.9 million (2.09 crore) respectively. Victims lost INR 14.6 million (1.46 crore...

Srikanth_Subra | 02 May 2012 | 0 comments


Now a days the data theft is increasing in many organizations which leads to loss of data in turn business.

we can follow the below ways to protect our data which is the valuable resource

1. While we are using any DLP Solutions we can assign least permissions in policies

2. We can restrict the permissions to the important files which we are using based on user level

3. We can use the encryption solutions like PGP encryptions

4. We can restrict the use of removable media like USB and other devices

5. We need to monitor and audit the file transfer sites

6. We need to create security controls if systems are connecting to Wireless

By using the above ways we can still keep in control the data theft.

JDrain | 27 Apr 2012 | 0 comments

Thank you for expressing interest in providing us with feedback on DLP while at Vision!

We have several exciting feedback opportunities specific to DLP at Vision this year.  By participating you’ll have the chance to influence how the product is developed and to make sure that the requirements of your company are well understood.


During each session, you can expect to be asked some background questions about your role and your use of DLP.  We will also show you some mockups to gather your feedback as well as give you the chance to ask questions of a product expert.


As thanks for your participation, and if permissible by your company policy, we will offer you a $75 gift card redeemable at a host of online vendors. 


DLP Usability Activities at Vision

01. Malicious Insider Usability 1:1s | Duration: 60 minutes

  • Topic...
JDrain | 25 Apr 2012 | 0 comments

Good meeting all.

We recieved a presentation from Chirag Shah on the lessons learned from his upgrade at eBay. Also, Mario Espinoza gave us some insight into existing and upcoming feature sets, including DLP for Tablets.

Some of the slides are attached to this post.  There will be more to follow.

Congrats to Visa on winning the door prize.

gschumm | 17 Apr 2012 | 0 comments

Last year, there were nearly 900 data breaches (more than in 2009 or 2010*), resulting in 31 million records breached**. And, as the number of reported breaches continued to rise, organizations paid a hefty cost for data breaches, according to this year’s Cost of a Data Breach Study. Some interesting facts from the 2011 study:

  • The organizational cost of a data breach was $5.5 million
  • The cost per lost or stolen record was $194
  • Negligence was the root cause of 39 percent of the data breaches, while malicious attacks caused 37 percent of data breaches (up 6 points from 2010)
  • For the first time, malicious attacks accounted for more than a third of breaches; they also remain the most costly type of breach at $222 per compromised record
  • Data-stealing malware is the leading attack type at 50 percent
  • The second most common type of malicious attack comes from within the...
Beverly van de Velde | 29 Mar 2012 | 0 comments

Education Enablement Services is developing a Symantec Cloud Security Essentials course that combines the CSA training in order to achieve the CCSK credential & a Symantec Certified Professional (SCP) in Cloud Security credential. 

This is an open call for your experiences with reviewing, designing, or implementing security solutions in a cloud environment.  These could come from situations unique to the cloud (ex. compliance issues for systems in a public cloud) - OR - general security solutions addressed in cloud environments (ex. how existing encryption policies were applied to a cloud architecture). 

We need your:
• Specific examples of security solutions in cloud environments
• Example cloud architectures – good or bad – implemented by customers
• Key questions, challenges, and concerns from customers migrating their infrastructure to...

Deb Banerjee | 17 Feb 2012 | 0 comments

Traditionally information security has been reasoned in terms of assets, vulnerabilities and threats. A mature info-sec program has visibility into its critical assets, a compliance program for reducing its attacks surfaces and vulnerabilities therein, and in detecting and blocking threats.  A rich set of patterns and practices have emerged in supporting these for the physical (and static) data center. These include segmentation as a key practice for isolating higher-trust workloads (eg. PCI) from lower-trust workloads (e.g. test, VDI).  Another important aspect is change control  that surfaces through multi-step provisioning cycles and  change management processes. While these practices are important to ensuring compliance and minimizing attack surfaces, there have impacted IT's ability to respond to changing business requirements.  For example, physically segmented workloads create challenges in resource utilization e.g. ...

AR Sharma | 17 Feb 2012 | 5 comments

Much awaited Symantec DLP 11.5 is now released. As usual, there are bug fixes of the version lower than 11.5

Among the new feature, there are two which will really help the product grow in all direction.

1. Integration with Websense (Websense URL filtering)- Although this integration was technically possible earlier as well but not supported by Symantec. Now, officially, it's supported by Symantec. This feature uses ICAP protocol. This integration is all about the good and healthy competition between Symantec and Websense.

2. DLP for tablets- Looking at the growth of tablets in organization and concept of BYOD (bring your own device) that organizations are promoting, DLP for tablets is the need of the hour. Tablet prevent for web currently supports Apple iPad iOS4 and iOS5 which can be used for transmitting sensitive information over HTTP, HTTPS and FTP. Tablet prevent can be used to secure email which can be sent through a tablet using MS Exchange...

Marie Pettersson | 10 Feb 2012 | 1 comment

I am absolutely blown away with what is going on in the mobile world and the latest numbers from IDC demonstrate the fact that mobile is breaking every record. A year on year growth of 57% for Smartphone shipments compared to last year. Do I need to say more? These devices will be used for business and private matters and they function merely as a pc. So what is the difference?  I think that we don’t consider that question enough, we simply use it together with all the features we can get our hands on; mobile banking and payments, browsing the web, reading emails, downloading apps, gathering intelligence, and the list goes on... So why should we separate the way we manage mobile devices from any other device or endpoint connected to our network?

Adaptive Mobile did a report last year on the mobile threats and their key conclusions were that mobile scams are way more profitable than the traditional pc scams (2%...

Ctrox | 30 Jan 2012 | 1 comment

Aliens have invaded earth with the intent to wipe out mankind. But ex-scientist turned cable technician, David Levinson (Jeff Goldberg), helps mobilize a plan to use the “common cold” or computer “virus” to fight back against the alien species and bring down their defenses in the 1996 movie Independence Day.
While the story is fiction, the potential damage that a virus or malware can do to businesses and peoples’ lives is all too real. In fact, attackers unleashed an average of more than nine new threats every second in 2010.
The healthcare industry knows firsthand about virus outbreaks. Take the Conficker virus that infected hundreds of MRI devices around the world. In fact, healthcare leads the industry in data breaches with more than 400...