Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Sian John | 15 Jul 2014 | 0 comments

An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.
 
This question becomes increasingly important when considering software-defined networking (SDN) or more specifically, what happens as the creation of virtual machines becomes increasingly automated?
 
As use of SDN increases, so it becomes more important to ensure all security features are enabled - such as intrusion protection, firewall and behavioural monitoring - not just antivirus.
 
This is primarily because it may not always be obvious how and where a VM is to be used, and therefore how well protected it needs to be. However it is not so straightforward to run some features 'off-VM' - for example behavioural monitoring requires direct access to system resources.
 
Equally there are times when it makes more sense to run...

Paul Wood | 14 Jul 2014 | 0 comments

Trends are complicated things. Consider, for example, the threat often called Ransomware. In our annual Internet Security Threat Report, all signs were that it was following a steady growth path which would continue into 2014. However, more up to date intelligence (as documented in our May 2014 Intelligence Report) suggests otherwise. It remains to be seen if the threat is cyclic, so we shall continue to watch with interest.

So, what gives? To understand Ransomware, we need first to understand how and why it emerged. Before Ransomware another form of extortion was prevalent, called Fake Antivirus (Fake-AV, or rogue security software). This would find its way onto a victim’s computer through email, website drive-by or other means, and then...

Symantec Analyst Relations | 01 Jul 2014 | 0 comments

Customers, partners and analysts gathered together to hear the latest on Symantec’s unified vision for its security portfolio and insights on the company’s new Managed Security Services – Advanced Threat Protection (MSS – ATP).

Held at the Raffles Convention Centre, the Singapore Symantec Security Symposium began with Country Director Yuh Woei Tan’s opening note that set the theme of the event – “Proactive. Practical. Trusted Security”– in place. The theme was also echoed by Sean Doherty, Vice President of Technical Strategy & Operations, whose keynote on Symantec Unified Security homed in on the billions of attacks that are happening to our customers each year. In an environment where breaches are inevitable and information is everywhere...

tgrandpre | 26 Jun 2014 | 0 comments

If there is one message that Symantec would like you, the analyst community, to recognise and take on board right now, it is this: We are not slowing down in the least. Symantec has real momentum and conviction around where it wants and plans to be – and nowhere is this better demonstrated than in our recent acquisition of NitroDesk, which totally reaffirms our commitment to mobile.

This is a great purchase for Symantec and our customers, enabling us to integrate NitroDesk’s mature email application with Symantec’s existing app-wrapping, device management, threat protection, data loss prevention, authentication and identity technologies – thus delivering a solution that improves business collaboration and out-of-office productivity.

At the same time, you can expect further mobile enhancements to be rolled out in the coming months to...

fbunn | 17 Jun 2014 | 0 comments

While Communications Service Providers (CSPs) tell their customers they are more than ‘simply' network utilities, it stands to reason that they need to provide similar levels of service to traditional utility companies such as water or energy providers. 

In security terms this means offering a certain level of information protection - as has been said more than once, just as we expect water to come out of our pipes clean, so we expect the same for our information. 

This doesn’t mean that the onus is entirely on the CSP, of course. Across the history of end-point security, providers and software vendors have had to work together to help protect the confidentiality, integrity and availability of data whether it is at rest on a PC, or in transit across the network. 

More recently, the rise of mobile computing has seen handsets start simple and become increasingly complex, meaning that consumers are not always well prepared against...

Symantec Analyst Relations | 05 Jun 2014 | 0 comments

Symantec recently announced an entirely new approach to advanced threat protection (http://bit.ly/1mR5qsS) unveiling a roadmap of integrated solutions that demonstrates the security innovation power that only it can deliver to help customers solve their most complex problems.

In our upcoming analyst webcast, hear from Brian Dye, SVP Information Security Group, and Piero DePaoli, Sr Director Product Marketing, for a deeper look at Symantec's ATP strategy, product roadmap as well as our new offerings. Following a short video presentation, we will host a live Q&A session with both Brian and Piero.

When: Tuesday, June 17, 9:00am PT / 5:00pm UK Time

We hope that you will be able to join us for this informative webcast. Please contact Chhavi_Ahuja@symantec.com or...

msmart007 | 05 Jun 2014 | 0 comments

In a previous blog, I described a number of dilemmas around cybersecurity - notably how its presence as a board room topic sits uneasily with the IT department’s poor perception of security, which couples with an increasing realisation that cyber threats cannot be addressed with IT alone. Even as technology becomes intrinsic to business life in this, hyper-connected world, the bad guys are developing ever more targeted threats as we see in our recent Internet Security Threat Report (ISTR).

It’s not up to us security experts to rain on this parade or tell the businesses we advise they’re doing it all wrong - I doubt they would listen even if we did. Our enterprise customers tell us their businesses wouldn’t be where they were today without taking risks, be they financial, organisational or indeed...

Straners | 29 May 2014 | 0 comments

All too often, technology is subject to the law of unintended consequences - a great, positive example is SMS, which was originally planned as a tool for maintenance alerts. Less positive is the exploitation of the humble macro system in documents and spreadsheets, or the use of email for social engineering attacks. 

Designers of such features can say they weren’t supposed to be used like that, but the fact is that when a new innovation arrives, people will start taking it in unexpected directions. We’ve seen this most recently with mobile technologies yielding Bring-Your-Own-Device (BYOD), the various benefits being tempered by consequences such as manageability and security. 

One of the more interesting parts of my job is asking what is coming next, and what the impacts - positive and negative - might be. A particular area of interest (and concern) is the Internet of Things (IoT), a term being used to describe what happens when...

fbunn | 21 May 2014 | 0 comments

An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are seeing the largest increase in targeted attacks. These attacks have already increased by 91% year on year; in addition, whereas 50% were aimed at SMBs in 2012, by 2013 the number had increased to 61%.

The clear suggestion - confirmed by other research we have done - is that the creators of such attacks are becoming smarter in terms of understanding how to profit from targeted attacks. As a result they are focusing less on bigger enterprises and more on smaller and mid-size companies, which often have less security countermeasures in place. 

This begs the question - where are such organisations going to get help, and...

James Hanlon | 20 May 2014 | 0 comments

For enterprises, these are testing times in the extreme. Never have IT departments – and the businesses that they support – been more exposed than they are today.

IT departments are challenged at every turn – with pressure from business leaders asking “is the business safe from cyber attacks?”; rapidly evolving IT estate complexity, including mobile rollouts, new cloud deployments and emerging software-defined data centres. IT relies heavily on its security teams, who are left to deal with disconnected security architectures and struggle with underfunding, and often a lack of incident investigation resources to be able to deal effectively with the waves of security incidents.

The thing is that attackers know this and are constantly seeking to extend their reach into the very fabric of the IT operations. As a result, many organisations are left vulnerable and at risk.

And it’s the nature of the attacks that are causing most consternation. Today’s...