Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Communication Service Providers (CSP)
Showing posts in English
dlw2012 | 26 Sep 2014 | 0 comments

Please join Light Reading and Symantec for a webcast titled When MDM is not enought: Service Provider Key Considerations for Monetizing Mobility on October 15, 2014 at 11:00 am ET/8:00 am PT.  The webcastwill be hosted by Ari Banerjee, Principal Analyst, Service Provider IT for Heavy Reading and Ellen Linardi, Director  of Product Management, Enterprise Mobilty for Symantec.

All attendees to the webcast will also receive a copy of the Heavy Reading whitepaper, The Pillars of a Next-Generation Enterprise Mobility Solution.

CLICK HERE TO REGISTER....

dlw2012 | 24 Jun 2014 | 0 comments

Please join Light Reading and Symantec for a webcast titled Elevate your Security Profile with SDN/NFV and Security Orchestration on July 15, 2014 at 12:00 noon EDT/9:00 am PDT.  The webcastwill be hosted by Caroline Chappell, Senior Editor for Heavy Reading and Doward Wilkinson, Distinguished Systems Engineer for Symantec.  

All attendees to the webcast will also receive a copy of the Heavy Reading whitepaper, Scoping a Security Orchestration Ecosystem for SDN/NFV.

CLICK HERE TO REGISTER...

fbunn | 18 Jun 2014 | 0 comments

An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are seeing the largest increase in targeted attacks. These attacks have already increased by 91% year on year; in addition, whereas 50% were aimed at SMBs in 2012, by 2013 the number had increased to 61%.

The clear suggestion - confirmed by other research we have done - is that the creators of such attacks are becoming smarter in terms of understanding how to profit from targeted attacks. As a result they are focusing less on bigger enterprises and more on smaller and mid-size companies, which often have less security countermeasures in place.

This begs the question - where are such organisations going to get help, and from whom?...

dlw2012 | 14 Mar 2014 | 0 comments

Abstract:

When it comes to security most M2M networks that leverage service provider networks rely heavily on 3GPP security for authentication and encryption. But the M2M business model is now evolving from a closed or walled garden model into one which is a lot more open. The model is more open to real-time control based applications rather than mere reporting. It’s more open to third party applications. It’s more open to devices dynamically discovering other 3rd party devices. It’s also more open to sharing of data with partners.  And as the business model becomes more open, so new security requirements arise as do new vulnerabilities to security threats. This webinar will discuss the journey that services providers are looking to take with the M2M business model and the new security solutions they need to put in place to support them.

Featured Speakers include Patrick Donegan, Heavy Reading Senior Analyst and Vaughn Eisler, Business...

dlw2012 | 29 Jul 2013 | 0 comments

Earlier this month, Symantec discussed the discovery of the Master Key vulnerability that allows attackers to inject malicious code into legitimate Android applications without invalidating the digital signature. We expected the vulnerability to be leveraged quickly due to ease of exploitation, and it has.

Norton Mobile Insight—our system for harvesting and automatically analyzing Android applications from hundreds of marketplaces—has discovered the first examples of the exploit being used in the wild. Symantec detects these applications as Android.Skullkey.

We found two applications infected by a malicious actor. They are legitimate applications distributed on Android marketplaces in China to help find and make doctor appointments. ...

fbunn | 10 Mar 2013 | 0 comments

At last week’s CeBIT 2013, Deutsche Telekom has announced a strategic partnership with Symantec to offer cloud services to their SMB customer base and target markets. This is another great example that shows how Symantec supports Communication Service Providers in delivering information protection services and generating new business. 
See the Deutsche Telekom announcement from March 04, 2013 for more information: http://www.telekom.com/media/consumer-products/179842

fbunn | 07 Feb 2013 | 0 comments

Symantec at Mobile World Congress 2013 in Barcelona

Symantec’s theme at the upcoming MWC 2013 in Barcelona is ‘Mobility without vulnerability’.

For Communication Service Providers we will discuss:

  • Information Protection as a Service (Cloud and Mobile Services)
  • LTE Infrastructure Protection
  • M2M Security Services
  • Next Generation Network Protection
  • Embedded Security and Availability (interesting topic for NEPs and NSVs)

Interested to learn how CSPs can protect their infrastructure and easily deliver information protection services? Please visit Symantec in hall 5 at booth #5C85. If you like to schedule a meeting in advance, please click here:  Schedule 1-1 meeting at MWC 2013

Looking forward to seeing you at MWC...

dlw2012 | 16 Jan 2013 | 0 comments

The traditional network architecture for carriers is under a fundamental change to meet the requirements of today's enterprises and end users. Industry standards that are aimed at simplifying and driving costs out of traditional networks are being driven by the need to be competitive and cost effective. Recently an industry led initiative called the Open Network Foundation (ONF) is leading an effort to do just that. They are working on an architecture called Software Defined Networks (SDN) that is transforming the network architecture of the future. This architecture is squarely targeted at taking the current inefficiencies of proprietary networks and improve costs, automation and innovation while improving control, reliability and security.   Symantec has a number of solutions that play a significant role in how SDN is deployed.  Key areas include: 

  • Security
  • Availability
  • Virtualization ...
Symantec Corp. | 29 Nov 2012 | 1 comment

by Arnaud Taddei

Nigeria one week; Las Vegas the next. Two very contrasting trips spent talking to Service Providers, Communications Service Providers, and Telcos—but equally incisive in helping to understand what makes them tick. In fact, looking back over the 20 years I’ve been in the communications and technology business, I’ve met hundreds of CXOs from this industry and it’s given me privileged insight into what their pain is, what their problems are, and what keeps them up at night.

Let’s see if I’m right.

It’s clear that all three—Service Providers, Communications Service Providers, and Telcos (I’ll refer to Service Providers for brevity)—are driven to grow revenues. That’s a given, as is the demand to maximise customer ‘stickiness’. But they also know their brand reputation is at stake: one outage, one leak of confidential data, and they could be tomorrow’s Enron....

dlw2012 | 15 Nov 2012 | 0 comments

Host: Caroline Chappell, Senior Analyst, Heavy Reading
Featured Presenter: Chip Epps, Principle Product Mangr, Symantec
Date: Tuesday, December 11, 212
Time: 11:00 a.m. New York/4:00 p.m. London
 

Webcast Overview:
Telco’s are faced with a set of competitive pressures to reduce capex and opex while increasing their ability to offer compelling new and profitable business services. Many are looking at virtualization as a means to gain control over expensive resources and their utilization. However, there are risks that need to be managed to realize the full promise of virtualization. Security and high availability are essential to this and are an integral part of any plan in order for the services to be trusted.

This webinar, hosted by Light Reading and Symantec will review these issues and discuss how...