Symantec Positioned as a Leader in the Endpoint Protection Platforms Magic Quadrant

2017-07-27T00:01:08+00:00 March 13th, 2011|Uncategorized|

Symantec Corp.  announced that it has been positioned by Gartner Inc. in the Leaders Quadrant of the 2010 Magic Quadrant for Endpoint Protection Platforms (EPP).

“Attention to better software management and maintenance is the key to reducing the attack surface and protecting users from social engineering attacks,” notes the Magic Quadrant report, which positions vendors based on their ability to execute and completeness of vision. “Application control, configuration management, and vulnerability detection and remediation are the most effective proactive forms of malware defense. These methods reduce the overall attack surface and neuter the vast majority of threats.”

“As the security landscape rapidly changes, the traditional approaches to security fail to protect against the new sophisticated attacks,” said Art Gilliland, vice president for Symantec Enterprise Security Group. “We believe our position in the Gartner Magic Quadrant for Endpoint Protection confirms Symantec’s leadership in the execution and vision for our comprehensive and integrated security solution which delivers the protection and tools required to effectively stop the latest malware attacks.”

Symantec Endpoint Protection integrates antivirus, antispyware, desktop firewall, intrusion prevention, device and application control and optional network access control to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.

To address the challenges of endpoint security as a result of complex IT infrastructures, virtualized environments and consumerization of IT, Symantec has consistently augmented its endpoint security offering from a technology, efficacy and performance perspective. In a recent series of tests measuring the performance of enterprise and small business endpoint security solutions conducted by PassMark Software, Symantec Endpoint Protection outperformed all competitive products.

About Business Solutions from Symantec
Symantec helps organizations secure and manage their information-driven world with endpoint security, messaging security, web security, data protection and security management solutions.

About the Magic Quadrant
The Magic Quadrants are copyrighted 2010 by Gartner, Inc. and are reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Symantec
Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Source: Symantec

Xen.org Unveils Ultimate Cloud Development Environment with First Xen Cloud Platform Release

2017-07-27T00:01:08+00:00 March 13th, 2011|Uncategorized|

» Xen.org, the home of the open source Xen hypervisor, today announced the availability of Xen® Cloud Platform (XCP) 1.0.  Developed as part of the Xen Cloud Project introduced in 2009, XCP 1.0 provides a full-featured solution for small and medium size enterprises wanting to build private clouds, as well as open source enthusiasts, universities and researchers wanting to experiment with cloud computing.  It represents a shift in enterprise usability for Xen.org, which has traditionally released software as source code only.  XCP enables developers to create and “play” with new and innovative technologies and techniques against a mature, stable and scalable virtualization stack.  

Facts and Highlights:

  • XCP is an open source server virtualization platform in a single, tested installable image that features the Xen hypervisor, network and storage support, a management stack and tools, as well as support for a range of guest operating systems including Windows® and Linux®.  
  • As a result of the close alignment between the Xen.org and OpenStack communities, XCP 1.0 integrates seamlessly with the OpenStack Bexar release, providing an end-to-end open source software stack covering everything from the bare metal to cloud orchestration software.  This integration will significantly help progress the vision of Xen.org and OpenStack to enable widespread ubiquity of virtual and cloud computing.
  • XCP 1.0 includes a fully featured, enterprise-class Xen API Management tool stack with features such as disaster recovery support, security, real-time performance monitoring, support for multi-host resource pools, and upgrade and patching capabilities.
  • XCP 1.0 provides support for virtual networking capabilities via Open vSwitch and a range of open source GUI management tools.
  • The Xen community will also be enabled to test features with XCP 1.0 that could offer future value to enterprise products such as Citrix XenServer® and Citrix OpenCloud.

Quotes:

  • Margaret Lewis, Director of Commercial Software Solutions, AMD:  “2011 is set to be the year when cloud deployments become even more widespread, and tools like XCP 1.0 will prove critical in developing the mature and secure cloud services of tomorrow.  AMD is committed to supporting the open-source Xen Community. The powerful combination of  AMD Opteron™ processors, with high core counts and outstanding power efficiency, and the Xen Cloud Platform can enable innovative, end-to-end solutions that deliver the features, scalability and performance that cloud providers require.”
  • Andrew Warfield, Assistant Professor, Department of Computer Science, University of British Columbia:  “XCP gives my students the opportunity to explore interesting new applications of virtualization – things like high-availability, next generation storage, and enhanced software development tools – all against a mature, stable, and scalable virtualization stack.  It’s a fantastic resource!”
  • Stephen Spector, Community Manager, OpenStack  “We are pleased the Xen.org and OpenStack communities are working together to advance open source cloud standards.  The OpenStack mission is to build the open standard cloud operating system with broad technology contributions and industry support, and support from the Xen.org community progresses that mission.”
  • Dan Kakinoki, President and CEO, VA Linux Japan:  “As a Xen.org advisory board member, VA Linux is excited to see XCP 1.0 and the new functionalities it offers.  It provides our clients an excellent opportunity and we expect it will continue to be the largest cloud platform. VA Linux continues to deliver high-quality consulting services for the Xen-based cloud technology in Japan.”

Source: Citrix

How the Cloud Is Transforming IT

2017-07-27T00:01:08+00:00 March 13th, 2011|Uncategorized|

In a business world where first movers gain the advantage and IT is central to every decision, IT responsiveness and agility provide a competitive edge. Yet many IT organizations aren’t quick enough on the uptake because their infrastructures are exorbitant to manage and too complex to easily adapt.

Cloud computing provides a vastly more efficient, flexible, and cost-effective way for IT to meet escalating business needs: IT as a service. VMware offers you an evolutionary and practical path to this new model, with solutions that harness the power of the cloud while ensuring security and preserving the value of your existing technology investments.

VMware’s Approach: Enabling the Journey to Your Cloud

Virtualization is the essential catalyst for cloud computing. As the virtualization leader, VMware builds on this solid foundation with platforms and solutions to pow

er your cloud infrastructure, build and run robust cloud applications, and supply end-user computing as a cloud-based service.

Our approach is comprehensive, but unlike other cloud offerings, it’s not one-cloud-fits-all. To deliver competitive advantage, cloud computing must be flexibly tailore

 

d and aligned to your individual needs. For your enterprise, that could mean a cloud that’s internal and private, one that leverages external services, or a hybrid cloud that combines both.

Whichever cloud option suits you best, only VMware offers a complete solution stack for building and managing it, plus a broad partner ecosystem to ensure that everything in it works seamlessly and securely. The result is not just any cloud, but your cloud—where accelerated IT delivers accelerated results for your business.

VMware’s tailored approach delivers flexibility and security while protecting your existing investments, by enabling:

  • Efficiency Through Utilization and Automation
    Resource pooling and a self-managed, dynamically optimized environment dramatically increase IT performance—leveraging existing resources to avoid unnecessary infrastructure investment and technology lock-in. The result is lower total cost of ownership (TCO).
  • Agility with Control
    Cloud computing aims to empower end-users while ensuring security and preserving IT oversight and authority. The VMware solution interweaves all three, greatly simplifying IT services provisioning and deployment while maintaining IT control, protective safeguards, and regulatory compliance. The IT organization can thus respond more quickly and securely to evolving business needs.
  • Freedom of Choice
    IT retains the ability to support traditional systems and gains the flexibility to deploy them internally or externally, without being restricted to any single technology or vendor. Developers can build applications that are portable among hybrid, private, and public clouds within a common management and security framework.

 Our Solutions. Your Cloud. Key Advantages.

VMware solutions are engineered and integrated to equip your cloud with a unique combination of benefits:

Security

VMware solutions deliver always-on, virtualization-aware security that adapts to the dynamism of cloud-based deployments while simplifying the protection of endpoints, applic

ations, and the network edge.

Automation and Management

Once IT resources are virtually pooled, business rules, policies, and defined service levels are mapped to them, creating a highly efficient, self-managing i

 

nfrastructure where IT is available as a service.

Interoperability and Openness

With a shared management and security model based on open standards, VMware solutions free you from vendor lock-in, ensuring application portability between internal datacenters and external service provider clouds hosted by VMware vCloud partners. Additionally, the </LINK 34657>VMware cloud application platform lets developers build robust modern applications that are portable, dynamic, and optimized for elastically scalable deployment on popular public clouds such as VMforce and Google App Engine.

Self-Service for the Cloud

Our approach delivers a new level of IT efficiency by standardizing and automating IT services provisioning and management. Rather than having to wait for manual provisioning, line-of-business units can deploy standardized, preconfigured IT services from a Web-based catalog available via a self-service portal. Business units receive tailored services right when they need them, IT administrators are relieved of the bulk of their maintenance burden, and IT preserves control over policies, compliance, and internal chargeback.

Pooling and Dynamic Resource Allocation

Your IT resources are pooled and abstracted into logical building-blocks of storage, network, and server units—effectively creating virtual datacenters. These resource containers are then dynamically allocated to your various applications, governed by defined business rules and user demand.

 

Join the Evolution to Your Cloud

Cloud computing holds the very real promise of agile, efficient IT service delivery with dramatically lower complexity, significantly reduced costs, and much greater business responsiveness. The key to realizing these advantages is tailoring the cloud model to work for your business and your approach to IT.

As the acknowledged leader in virtualization and cloud infrastructure, VMware is uniquely positioned to help you transition to your cloud—the private, public, or hybrid c

 

loud environment that’s best fits your business needs and goals. Thousands of enterprises have already achieved exceptional results with VMware solutions. And because our approach is open, flexible, a

 

nd geared to addressing individual needs, they’ve done so without a heavy customization burden.

 

VMware offers a 3-layered solution stack to supports your evolution to the cloud:

  • Cloud Infrastructure and Management. The foundation for your cloud, based on virtualization and the ability to unify private and public cloud resources with consistent security, compliance, management, and quality of service.
  • Cloud Application Platform. Enabling developers to rapidly build and run modern cloud applications while deploying on premises or off for maximum flexibility.
  • End-User Computing. Creating a modern, user-centric approach to personal computing, delivering secure access to applications and data from any device, anytime and anywhere.

Source: VMware

Symantec Endpoint Protection 12 Delivers Unrivaled Security with Fastest Performance

2017-07-27T00:01:08+00:00 March 2nd, 2011|Uncategorized|

Symantec announces new versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition (currently in beta), providing businesses of all sizes with advanced protection while improving system performance. Complete with advanced features to secure virtual infrastructures and powered by Insight, Symantec’s award-winning community and cloud-based reputation technology, Symantec Endpoint Protection 12 is designed to detect and block sophisticated new threats earlier and more accurately than any other security product.

Security threats have become more sophisticated and more widespread, creating a challenge for traditional signature-based security solutions. Last year, attackers unleashed more than 286 million distinct malicious programs, an average of more than nine new threats every second of every day. This explosion in malware scope and complexity is due in large part to the proliferation of easy-to-use attack toolkits—such as Zeus—which lower the barrier of entry in cybercrime. These toolkits enable hackers to continuously generate new mutated malware variants, each targeting a different victim, making traditional discovery and fingerprinting of these threats nearly impossible. According to Symantec’s Attack Toolkits and Malicious Websites Report, at least 61 percent of threat activity can be attributed to attack toolkits. As these toolkits grow in popularity, the trend towards millions of narrowly distributed, high impact threats will continue. Symantec Endpoint Protection 12 leverages Insight to provide unmatched protection against this new threat landscape.

Key Benefits

  • Unrivaled Security: Symantec Endpoint Protection 12 blocks new and unknown threats missed by traditional signature, heuristic, behavioral and HIPS-based security solutions. All of the product’s security engines are now reputation-enabled, leveraging Insight’s online reputation database to identify and block malware attacks. Symantec’s Insight has analyzed the anonymous software adoption patterns from more than 175 million customer computers to automatically derive highly accurate security ratings for more than 2.5 billion unique software files—Insight has ratings for virtually every software file, good or bad in existence. In addition, SONAR 3, the world’s first hybrid behavioral-reputation engine, blocks zero-day and highly targeted threats based on their joint behavior-reputation profile. As part of a commissioned test, the leading security testing organization, AV-Test.org, recently compared a number of major endpoint security products on their effectiveness in blocking new threats as well as cleaning up pre-existing infections. Symantec Endpoint Protection 12 (beta) received the top score against all tested competitors in both categories.
  • Fastest Performance: Symantec Endpoint Protection 12 leverages cloud-based community intelligence to reduce the overhead of virus scanning by as much as 70 percent by using Symantec Insight to automatically identify and whitelist trusted high-reputation files, resulting in fewer, faster and smarter scans. The new, Insight-driven compatible scan engine is also designed to do most of its work while computers are idle. In the latest roundup of PassMark Software’s performance test of enterprise and small business security solutions, Symantec Endpoint Protection 12 reported the fastest scan speed and was found to be twice as fast as the average security solution. Symantec Endpoint Protection 12 also used the least memory,57 percent less memory usage than the average security solution.
  • Built for Virtual Environments: Symantec Endpoint Protection 12 offers comprehensive defense against all types of attacks and is optimized for performance on virtual systems. Symantec Endpoint Protection 12 can whitelist baseline images, maintain a local Insight cache, randomize scans and updates, and automatically identify and manage virtual clients. This is above and beyond the performance improvements gained with Insight. Together these innovations dramatically reduce the load on virtual hosts, alleviating ‘AV Storms’/concurrent scans from bogging down system resources and allowing for faster, more responsive systems, which can in turn support greater density of virtual instances. Symantec is working closely with VMware to take full advantage of virtualization awareness and introspection capabilities based on VMware vShield™ technology and Symantec Endpoint Protection 12 is the first step along the optimization path for virtual environments.
  • Small Business Edition: Leveraging Insight and Sonar 3, Symantec Endpoint Protection Small Business Edition offers enterprise-class threat detection technologies and performance improvements with simple to use features such as an installation wizard, pre-configured policy settings and automated notifications and reports for small business customers. Symantec Endpoint Protection Small Business Edition meets small business needs with the fastest, most effective anti-malware capabilities in the industry. Small businesses will have peace of mind that their data is safe from cybercriminals, so that they can stay focused on growing their businesses.

Beta Registration and Availability

Presently, Symantec Endpoint Protection 12 is in an invitation-only beta and is expected to be available for public beta in April 2011. The new versions of Symantec Endpoint Protection 12 are scheduled to be generally available later this year and can be purchased through Symantec’s worldwide network of value-added authorized resellers, distributors and systems integrators or directly. For more information on Symantec Endpoint Protection and to register for the public beta, please click here.

 Quotes:

“Cyber attacks are increasing in size, scope and sophistication and companies of all sizes are at risk. Symantec Endpoint Protection 12 leverages our award winning Insight technology to give our customers —from small businesses to large enterprises—the strongest protection and fastest performance available.”
— Francis deSouza, senior vice president, Enterprise Security Group, Symantec

“As virtualization plays an increasingly critical role in the enterprise, we see a growing need for security solutions designed to secure the virtual infrastructure. We are collaborating closely with Symantec so that VMware vShield™ Endpoint technology and Symantec Endpoint Protection will work together seamlessly, further ensuring that our customers have the security solutions they need for running business-critical applications on the VMware vSphere® platform.”
— Parag Patel, vice president, Global Strategic Alliances, VMware

“The reporting capabilities are much improved, and that means a lot less time we have to spend monitoring and addressing threats to our network and systems. Symantec has developed endpoint security software that is effective against the more insidious, targeted attacks without negatively impacting system performance.”
— Christian Sosa, network security engineer, 20th Century Fox

“We’re a growing small business and our security needs become more complex each day. Since participating in the new Symantec Endpoint Protection Small Business Edition Beta program, we are seeing improved performance on our machines and more importantly, we feel relieved to know we don’t have worry about the threats out there.”
— Robert Lantrip, Owner, Ourco Welding and Industrial Supplies

“Symantec is delivering a product that will help us identify and block the new threats that are created every day. I’ve also seen dramatically improved scan times because the reputation-based security technology does not waste time scanning files with good reputations. That means our users are able to work without being slowed down or interrupted by our security software.”
— Seth Shestack, associate director of information security, Temple University

“I was particularly impressed with the Intrusion Prevention Scanning. It improves the speed of scans, significantly reducing the impact on the performance of users’ computers. Additionally, the installation time for Symantec Endpoint Protection is really fast, and with the amazing new features, I am anxious for it to be released to install for our clients as soon as possible.”
— Alex Solovyev, Network Support Technician, Networking Solutions

About Business Solutions from Symantec

Symantec helps organizations secure and manage their information-driven world with endpoint security, messaging security, web security, data protection, identity authentication and security management solutions.

About Security Technology and Response

The Security Technology and Response (STAR) organization, which includes Security Response, is a worldwide team of security engineers, threat analysts, and researchers that provides the underlying functionality, content, and support for all Symantec corporate and consumer security products, including the new Insight and SONAR 3 technologies. With Response centers located throughout the world, STAR monitors malicious code reports from more than 130 million systems across the Internet, receives data from 40,000 network sensors in more than 200 countries, and tracks more than 25,000 vulnerabilities affecting more than 55,000 technologies from more than 8,000 vendors. The team uses this vast intelligence to develop and deliver the world’s most comprehensive security protection.

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Note to Editors: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Forward-looking Statements:Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.

 Source: Symantec

Texas Children’s Hospital – Symantec Data Protection Success

2011-03-01T10:27:46+00:00 March 1st, 2011|Uncategorized|

The IT department at Texas Children’s Hospital has faced significant barriers over the past decade that introduced both cost and risks into the IT environment. First, the IT environment had to be secure and protected from attack, even to the level of the endpoint, and managed from a centralized console. Second, changes in healthcare and government regulations demanded regular and detailed security and compliance reporting. Third, as part of its deployment of Epic software for healthcare information and workflow management and the next-generation Oracle PeopleSoft upgrade, the Texas Children’s Hospital team sought to standardize data center infrastructure software for enhanced availability, improved labor productivity, and lower costs. Finally, the team wanted to centralize management of the desktop and laptop environments for greater flexibility, enhanced security, and streamlined efficiencies.A Total Operational & Economic Impact (TOEI) analysis by The Alchemy Solutions Group found the different solutions from Symantec are driving more than $11.0 million in realized and projected business value in labor productivity gains, cost savings, and cost avoidance, for Texas Children’s Hospital. The timeframe for analysis ranges from January 2001 through December 2009.

Success Details

  • Servers: 600 servers running Microsoft Windows, IBM AIX, and Red Hat Enterprise Linux
  • Applications: Epic, Oracle PeopleSoft

Organization Profile

Texas Children’s Hospital, located in the Texas Medical Center in Houston, Texas, is one of the largest full-care pediatric hospitals in the United States. Dedicated to providing the finest possible pediatric patient care, education, and research, Texas Children’s Hospital is affiliated with Baylor College of Medicine and is its primary pediatric training site. Baylor professors also are the service chiefs and staff physicians of Texas Children’s Hospital. Texas Children’s Hospital’s Integrated Delivery System includes the nation’s first pediatric HMO, Texas Children’s Health Plan, with over 200,000 covered lives and Texas Children’s Pediatric Associates, and a physician practice group that includes 150 physicians at 44 offices.

Business Value Analysis Study

Data Center Infrastructure Standardization, Security Management, IT Compliance, Backup and Restore, and High Availability

The IT department at Texas Children’s Hospital has faced significant barriers over the past decade that introduced both cost and risks into the IT environment. First, the IT environment had to be secure and protected from attack, even to the level of the endpoint, and managed from a centralized console. Second, changes in healthcare and government regulations demanded regular and detailed security and compliance reporting. Third, as part of its deployment of Epic software for healthcare information and workflow management and the next-generation Oracle PeopleSoft upgrade, the Texas Children’s Hospital team sought to standardize data center infrastructure software for enhanced availability, improved labor productivity, and lower costs. Finally, the team wanted to centralize management of the desktop and laptop environments for greater flexibility, enhanced security, and streamlined efficiencies.

A Total Operational & Economic Impact (TOEI) analysis by The Alchemy Solutions Group found the different solutions from Symantec are driving more than $11.0 million in realized and projected business value in labor productivity gains, cost savings, and cost avoidance, for Texas Children’s Hospital. The timeframe for analysis ranges from January 2001 through December 2009.

Source: Symantec