Video Screencast Help
Security Community Blog
Showing posts tagged with Symantec Endpoint Encryption - Device Control
Showing posts in English
Mira Davda | 25 May 2012 | 0 comments

The value of data is appreciating, especially with organizations rapidly  adopting  new technologies to provide access to business information anywhere, at any time. This means threats to data or information translate into business risks to business. These risks, related to reputation, customer loyalty, finance and legal, are not only serious but also quantifiable.   The first benchmark Cost of Data Breach Study in India, conducted by the Ponemon Institute on behalf of Symantec, revealed that the average organizational cost of a data breach in India is INR 53.4 million (53.4 crore), with malicious breaches by hackers or criminal insiders being the most expensive type at INR 4,224 for one compromised record. 

The report further components of the total cost: detection, escalation and redressal formed a significant component, averaging INR 16.4 million (1.64 crore) and INR 20.9 million (2.09 crore) respectively. Victims lost INR 14.6 million (1.46 crore...

Marie Pettersson | 10 Feb 2012 | 1 comment

I am absolutely blown away with what is going on in the mobile world and the latest numbers from IDC demonstrate the fact that mobile is breaking every record. A year on year growth of 57% for Smartphone shipments compared to last year. Do I need to say more? These devices will be used for business and private matters and they function merely as a pc. So what is the difference?  I think that we don’t consider that question enough, we simply use it together with all the features we can get our hands on; mobile banking and payments, browsing the web, reading emails, downloading apps, gathering intelligence, and the list goes on... So why should we separate the way we manage mobile devices from any other device or endpoint connected to our network?

Adaptive Mobile did a report last year on the mobile threats and their key conclusions were that mobile scams are way more profitable than the traditional pc scams (2%...

Ctrox | 30 Jan 2012 | 1 comment

Aliens have invaded earth with the intent to wipe out mankind. But ex-scientist turned cable technician, David Levinson (Jeff Goldberg), helps mobilize a plan to use the “common cold” or computer “virus” to fight back against the alien species and bring down their defenses in the 1996 movie Independence Day.
 
While the story is fiction, the potential damage that a virus or malware can do to businesses and peoples’ lives is all too real. In fact, attackers unleashed an average of more than nine new threats every second in 2010.
 
The healthcare industry knows firsthand about virus outbreaks. Take the Conficker virus that infected hundreds of MRI devices around the world. In fact, healthcare leads the industry in data breaches with more than 400...

Kelvin_Kwan | 24 Jun 2011 | 16 comments

 

We are once again writing to follow-up on our early post related to a similar issue from January.  This time, it’s for Mac OS X upgrades to Apple’s just released 10.6.8 update and PGP Whole Disk Encryption for Macs. 

Much like the previous post, Apple’s automated Mac OS X 10.6.8 Software Update mechanism bypasses the protections of PGP Corporation had put around a critical file needed for normal system startup.  This time however, users who are running 10.1.1-Build 10 and newer had no problems with the Apple 10.6.8 update as expected.  Users running older versions, however, ran into problems.

As communicated previously, the PGP Engineering team discovered that the Apple automated Software Update mechanism bypassed the protections PGP built-in to protect the boot.efi file.  This...

Sean Yarger | 08 Jun 2011 | 2 comments

 

Let’s pretend for a moment that you’re on a business trip. You hear the boarding call for your flight and reach down to grab you laptop – only your laptop isn’t there. Whether it was left at security or snagged by another traveler in the terminal, your laptop is gone and your company data is at risk.

 

So what do you do? Typically you’ll need to make a call to the office, notifying your IT department of the incident. This call will initiate a chain reaction of events set into place to ensure measures are taken to secure the files and equip you with a new device to keep business running as usual. This process typically involves a series of forms, approvals, signatures, etc.

 

While it may sound simple, enforcing processes with effectiveness is one of hardest things for companies to do. With multiple people involved and steps required, any number of things can go wrong, slowing down the process –...

Chad Dupin | 01 Jun 2011 | 0 comments

ITS Partner is looking to hire a few Symantec Security Consultants / Engineers.

 

Location

West Michigan / Grand Rapids, MI Area.

Job Summary

This position will be focused on the implementation of Symantec security products within various customer environments. Job responsibilities include assessing customer needs and expectations, designing solutions to meet those needs, and then implementing the design. In addition to these activities the consultant will participate in the sales process (proposal creation, presentations, sales calls, demos, etc.). This position has the opportunity to grow into a leadership role within ITS to help guide and direct the security team.

Preferred Technical Qualifications

  • Symantec Endpoint Protection
  • Symantec Endpoint Encryption
  • Symantec Data Loss Prevention
  • Control Compliance Suite
  • PGP

Technical Knowledge

...
Mark Maynard | 10 Mar 2011 | 1 comment

We had a great Chicago Security & Compliance User Group meeting on March 8.  A fantastic presentation by Rich Bagurdes was very valuable and shows some real world examples of how to leverage all of SEP's features.  There was also another great presentation by Min about SEP 12.1 Amber that highlighted the new virtualization features and generated lots of additional questions and interest around the upcoming SEP 12.1  product.

Here are the available slides and even some video of the presentation.  Thanks goes to everyone who participated to make this another great event.  I am looking forward to participating at the next one that is coming soon in August 2011.

Enjoy!

Mark

SecuredThatToo | 17 Feb 2011 | 1 comment

Symantec just announced a pretty cool, interactive, free tool to help stay abreast of security trends and activities.  It even has historical data!  There’s an online version, a installable Windows gadget and you can access it via your mobile phone!  It's pretty slick!

Online Web Portal:
http://www.nortoncybercrimeindex.com

Windows Gadget Download:
http://www.norton.com/ProtectYourself

Mobile:
http://www.nortoncybercrimeindex.mobi

Check it out!!!

Thanks,
Min Ju

UCD4me | 05 Jan 2011 | 0 comments

The User Centered Design (UCD) team here at Symantec exists to help make customer experiences easier, more efficient and more useful for you.  Right now, we're ramping up several research projects where we are looking for those in security and compliance with a manger, director or CISO role to give us feedback in the form of short user stories.  This should require only a 30-45 minute commitment on the phone to share experiences and points of pain, and this effort is "product agnostic" so as long as you are involved with security, regardless of products used, we'd like to hear from you!

 

If you are interested, please email Kellie Mecham at kellie_mecham@symantec.com to arrange a date and time for the phone interview. 

 

We look forward to hearing from you!

 

Best wishes,

 

Kellie

 

 

Terry Cutler | 29 Oct 2010 | 1 comment

Announced at Symantec Vision Barcelona (http://www.symantec.com/about/news/release/article.jsp?prid=20101004_02) - the PGP and Intel Anti-Theft solution provides a great way to secure laptop PCs.

Summary of the PGP Whole Disk Encryption along with PGP Remote Disable & Destroy (RDD) with Intel Anti-Theft

  • Intel Anti-Theft: http://antitheft.intel.com/welcome.aspx - local and remote triggers to disable laptop.   Once disabled, laptop cannot be booted even if hard drive is reimaged or replaced.   Laptop can be reactivated upon recovery.   If event triggered, the BIOS is effectively disabled.
  • PGP WDE (Whole Disk Encryption) - providing the first layer of data protection.   Part of the encryption keys are stored inside ...