Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:04 PM
Dark Reading
Dark Reading
Products and Releases

Managing Your Company's Cyber Risk: Antivirus Software And Endpoint Protection

Symantec Endpoint Protection 12.1 is designed to stop mutating threats without slowing you down

MOUNTAIN VIEW, Calif., April 25, 2011 /PRNewswire/ -- Nine new threats every second, every day - that's 286 million distinct malicious programs lurking about last year alone. Yet it only takes just one trojan, one virus, one malicious little program to compromise a company's entire system. While signature-based security solutions may have once halted the risk, today's threats have metamorphosed into sophisticated, rapidly mutating attacks that can evade reactive security solutions. The advent of easy-to-use attack toolkits (responsible for at least 61 percent of threat activity), not to mention drive-by downloads, zero-day attacks and mutating spyware, means that antivirus software alone is no longer enough.

Cyber attacks are growing - growing in cost, growing in scope and growing in sophistication - putting companies of all sizes at risk. In fact, Symantec's Managed Security in the Enterprisereport found that 88 percent of the 1,000 enterprise security practitioners surveyed experienced cyber attacks in the past two years, with 30 percent rating these attacks as somewhat or highly effective. Ninety-seven percent experienced some sort of loss, including:

-- Downtime - 46% -- Theft of customer or employee personally identifiable information - 31% -- Theft of corporate data - 25%

Companies looking for antivirus software with advanced threat prevention that protects endpoints from targeted attacks need to consider comprehensive endpoint security solutions that ward off high-impact risks, while improving efficiencies and lowering costs in this new threat landscape. Powered by Insight, Symantec Endpoint Protection 12.1 is designed to stop new and rapidly mutating threats without slowing you down. Symantec Endpoint Protection delivers an unmatched defense against malware for laptops, desktops and servers. Key features include:

-- Seamless integration of antivirus, antispyware, firewall, intrusion prevention, device and application control -- A single agent that is administered by a single management console -- Powerful central management of security on Windows and Macintosh endpoints -- Enabling of instant NAC upgrade without additional software deployment -- Antivirus and antispyware for Macintosh and Linux clients -- Physical and virtual environment security

Symantec Endpoint Protection is the flagship of Symantec's growing family of endpoint protection solutions including, Symantec Endpoint Protection Small Business Edition and Symantec Endpoint Protection.cloud.

As the number and sophistication of web-based viruses and malicious code increases, Symantec Endpoint Protection offers organizations an advanced antivirus solution with threat protection, while helping to reduce administrative overhead and lower total cost of ownership for endpoint security. Visit http://www.symantec.com/business/endpoint-protection to learn more.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.