Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/23/2009
04:48 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Symantec Announces Managed Endpoint Protection Services

Offering provides management and monitoring of endpoint protection technologies, such as Symantec AntiVirus, Symantec Endpoint Protection, and Symantec Network Access Control

CUPERTINO, Calif. - June 23, 2009 - Symantec Corp. (Nasdaq: SYMC) today announced Symantec Managed Endpoint Protection Services, a new set of offerings which provides management and monitoring of endpoint protection technologies to defend users against malware and other sophisticated attacks, such as rootkits, zero-day attacks, and spyware. The new managed services leverage the customers' existing endpoint protection technologies, Symantec security experts, and the Symantec Global Intelligence Network to secure customer, employee, and corporate data, while providing expert management to help IT departments with the configuration, availability and effectiveness of their endpoint protection technologies.

Symantec's March 2009 Managed Security in the Enterprise report highlighted the need for additional protection from cyber threats that are growing in number and intensity and becoming more effective. According to the report, 88 percent of the 1,000 enterprise security practitioners surveyed experienced cyber attacks in the past two years with 30 percent rating these attacks as somewhat or highly effective. Nearly all (97 percent) experienced some sort of loss, including downtime (46 percent), theft of customer or employee personally identifiable information (31 percent) and theft of corporate data (25 percent).

In addition, Symantec's Internet Security Threat Report, Volume XIV, released in April 2009, underscored the significance of threats to the endpoint. According to the report, Symantec created more than 1.6 million new malicious code signatures in 2008, representing a 165 percent increase over 2007 and more than 60 percent of all the malicious code signatures ever created by Symantec.

To provide relief for IT departments in the face of increasing threats and staffing challenges, Symantec is offering Symantec Managed Endpoint Protection Services, which are composed of deployment, management, and 24x7 monitoring for endpoint protection technologies, including Symantec AntiVirus, Symantec Endpoint Protection, and Symantec Network Access Control. These services enable enterprises to secure information and manage endpoint risks, while lowering total cost of ownership, improving operational efficiencies, and meeting strict Service-Level commitments.

"The number and sophistication of Web-based viruses and malicious code continues to rise, yet organizations are having trouble addressing the problem on their own," said Grant Geyer, vice president, Managed Services at Symantec. "Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. Symantec Managed Endpoint Protection Services, in conjunction with Symantec's broad set of security products and services, provide customers with the confidence that their information is protected completely and managed easily."

Customers want to out-task IT operational activities, such as endpoint protection configuration and security updates, which consume significant time and energy, to focus on more strategic initiatives, fulfill compliance requirements and mitigate their overall IT risk. In fact, a majority (61 percent) of those surveyed in the Managed Security in the Enterprise report stated they are embracing managed security services for some or all of their IT security needs. Furthermore, organizations continue to deal with staffing challenges with two thirds reporting they are understaffed.

"Securing our corporate and customers' information is a top priority," said Lee North, Head of IT, Abu Dhabi Commercial Bank. "Considering the increasing number of laptops, PDAs, mobile devices, and the constant threat of malware, it is critical that we have an efficient approach to protecting our information assets. Working with Symantec allows us to keep our data secure with predictable costs."

Symantec Endpoint Protection Monitoring Symantec Endpoint Protection Monitoring extends remote security monitoring and correlation to critical endpoint protection solutions. Customer data is protected from threats with an around-the-clock remote monitoring service of endpoint protection solutions. Security events affecting protected endpoints are quickly identified, analyzed, and escalated for remediation. Symantec security analysts also use Global Intelligence Network threat information, along with other security event details from network protection systems, to investigate or validate incidents and appropriately escalate criticality. This helps IT security response staff prioritize those events which demand immediate attention and allows them to contain outbreaks before they spread.

Symantec Endpoint Protection Management Symantec Endpoint Protection Management protects data from threats by transferring management of the endpoint protection solutions to Symantec security experts operating under strict Service Level commitments. The service is delivered by security specialists who provide operational and lifecycle management for the endpoint protection infrastructure. This offloads the management burden from in-house security and infrastructure staff and ensures that endpoint protection systems are up-to-date to provide the highest level of proactive protection.

Pricing and Availability Symantec Managed Endpoint Protection Service is now available globally. Pricing is based on endpoint blocks and depends on the number of protected nodes and management servers.

About the Symantec Global Intelligence Network Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify, analyze, deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. More than 240,000 sensors in 200+ countries monitor attack activity through a combination of Symantec products and services as well as additional third-party data sources.

About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.