Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:48 PM
Dark Reading
Dark Reading
Products and Releases

Symantec Announces Managed Endpoint Protection Services

Offering provides management and monitoring of endpoint protection technologies, such as Symantec AntiVirus, Symantec Endpoint Protection, and Symantec Network Access Control

CUPERTINO, Calif. - June 23, 2009 - Symantec Corp. (Nasdaq: SYMC) today announced Symantec Managed Endpoint Protection Services, a new set of offerings which provides management and monitoring of endpoint protection technologies to defend users against malware and other sophisticated attacks, such as rootkits, zero-day attacks, and spyware. The new managed services leverage the customers' existing endpoint protection technologies, Symantec security experts, and the Symantec Global Intelligence Network to secure customer, employee, and corporate data, while providing expert management to help IT departments with the configuration, availability and effectiveness of their endpoint protection technologies.

Symantec's March 2009 Managed Security in the Enterprise report highlighted the need for additional protection from cyber threats that are growing in number and intensity and becoming more effective. According to the report, 88 percent of the 1,000 enterprise security practitioners surveyed experienced cyber attacks in the past two years with 30 percent rating these attacks as somewhat or highly effective. Nearly all (97 percent) experienced some sort of loss, including downtime (46 percent), theft of customer or employee personally identifiable information (31 percent) and theft of corporate data (25 percent).

In addition, Symantec's Internet Security Threat Report, Volume XIV, released in April 2009, underscored the significance of threats to the endpoint. According to the report, Symantec created more than 1.6 million new malicious code signatures in 2008, representing a 165 percent increase over 2007 and more than 60 percent of all the malicious code signatures ever created by Symantec.

To provide relief for IT departments in the face of increasing threats and staffing challenges, Symantec is offering Symantec Managed Endpoint Protection Services, which are composed of deployment, management, and 24x7 monitoring for endpoint protection technologies, including Symantec AntiVirus, Symantec Endpoint Protection, and Symantec Network Access Control. These services enable enterprises to secure information and manage endpoint risks, while lowering total cost of ownership, improving operational efficiencies, and meeting strict Service-Level commitments.

"The number and sophistication of Web-based viruses and malicious code continues to rise, yet organizations are having trouble addressing the problem on their own," said Grant Geyer, vice president, Managed Services at Symantec. "Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. Symantec Managed Endpoint Protection Services, in conjunction with Symantec's broad set of security products and services, provide customers with the confidence that their information is protected completely and managed easily."

Customers want to out-task IT operational activities, such as endpoint protection configuration and security updates, which consume significant time and energy, to focus on more strategic initiatives, fulfill compliance requirements and mitigate their overall IT risk. In fact, a majority (61 percent) of those surveyed in the Managed Security in the Enterprise report stated they are embracing managed security services for some or all of their IT security needs. Furthermore, organizations continue to deal with staffing challenges with two thirds reporting they are understaffed.

"Securing our corporate and customers' information is a top priority," said Lee North, Head of IT, Abu Dhabi Commercial Bank. "Considering the increasing number of laptops, PDAs, mobile devices, and the constant threat of malware, it is critical that we have an efficient approach to protecting our information assets. Working with Symantec allows us to keep our data secure with predictable costs."

Symantec Endpoint Protection Monitoring Symantec Endpoint Protection Monitoring extends remote security monitoring and correlation to critical endpoint protection solutions. Customer data is protected from threats with an around-the-clock remote monitoring service of endpoint protection solutions. Security events affecting protected endpoints are quickly identified, analyzed, and escalated for remediation. Symantec security analysts also use Global Intelligence Network threat information, along with other security event details from network protection systems, to investigate or validate incidents and appropriately escalate criticality. This helps IT security response staff prioritize those events which demand immediate attention and allows them to contain outbreaks before they spread.

Symantec Endpoint Protection Management Symantec Endpoint Protection Management protects data from threats by transferring management of the endpoint protection solutions to Symantec security experts operating under strict Service Level commitments. The service is delivered by security specialists who provide operational and lifecycle management for the endpoint protection infrastructure. This offloads the management burden from in-house security and infrastructure staff and ensures that endpoint protection systems are up-to-date to provide the highest level of proactive protection.

Pricing and Availability Symantec Managed Endpoint Protection Service is now available globally. Pricing is based on endpoint blocks and depends on the number of protected nodes and management servers.

About the Symantec Global Intelligence Network Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify, analyze, deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. More than 240,000 sensors in 200+ countries monitor attack activity through a combination of Symantec products and services as well as additional third-party data sources.

About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.