Easy Guest Access in Secure Wireless Networks

2017-07-27T00:01:08+00:00 November 17th, 2011|Uncategorized|

The Challenge

I’ve seen it happen; people sometimes hand out the corporation’s wireless security passphrases to allow visitors access to the internet.  Without the right equipment and design, this opens the internal network to the guest.  

Even though they’ve been warned that this behavior may put their infrastructure at risk, employees often want and need to give this access to their visitors.  It’s even more scary when policies are not in place to change pass phrases at regular intervals; possibly permitting the guest to retain the pass phrase for years without being noticed (obviously, I’m not talking about two factor authentication devices here).

One Solution

Several methods are available to allow guest access to the internet from your wireless network without sacrificing security.  Some require purchasing secondary wireless devices, and/or configuring VLANs throughout the network infrastructure.  Or if you’re lucky enough to have a Ruckus Wireless Controller, it’s built in.  Active Directory users can create their own guest passes on an easy-to-use webpage.

The Configuration

Within the Ruckus ZoneDirector, click the Configure tab.  Under the WLANs tab, create a new WLAN.  After the naming and description option, the Ruckus software allows three types of WLAN Usages (Standard, Guest Access, and Hotspot Service).  For Guest Access WLANs, the access is based on Guest Access Policies and access controls which are defined in Guest Access area of the Configuration tab.  Within here, you can define Authentication, compose your Terms of Use, and even Redirection of website requests.  Guest Pass Generation Authentication permissions can based either on a local database, or Microsoft’s Active Directory.  Most important within this section is Restricted Subnet Access.  The Ruckus setup acts as a proxy for guests thus easing the configuration by avoiding complex VLAN configurations throughout the networking infrastructure.

Problem solved!

 

Symantec Positioned as a Leader in the Endpoint Protection Platforms Magic Quadrant

2017-07-27T00:01:08+00:00 March 13th, 2011|Uncategorized|

Symantec Corp.  announced that it has been positioned by Gartner Inc. in the Leaders Quadrant of the 2010 Magic Quadrant for Endpoint Protection Platforms (EPP).

“Attention to better software management and maintenance is the key to reducing the attack surface and protecting users from social engineering attacks,” notes the Magic Quadrant report, which positions vendors based on their ability to execute and completeness of vision. “Application control, configuration management, and vulnerability detection and remediation are the most effective proactive forms of malware defense. These methods reduce the overall attack surface and neuter the vast majority of threats.”

“As the security landscape rapidly changes, the traditional approaches to security fail to protect against the new sophisticated attacks,” said Art Gilliland, vice president for Symantec Enterprise Security Group. “We believe our position in the Gartner Magic Quadrant for Endpoint Protection confirms Symantec’s leadership in the execution and vision for our comprehensive and integrated security solution which delivers the protection and tools required to effectively stop the latest malware attacks.”

Symantec Endpoint Protection integrates antivirus, antispyware, desktop firewall, intrusion prevention, device and application control and optional network access control to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.

To address the challenges of endpoint security as a result of complex IT infrastructures, virtualized environments and consumerization of IT, Symantec has consistently augmented its endpoint security offering from a technology, efficacy and performance perspective. In a recent series of tests measuring the performance of enterprise and small business endpoint security solutions conducted by PassMark Software, Symantec Endpoint Protection outperformed all competitive products.

About Business Solutions from Symantec
Symantec helps organizations secure and manage their information-driven world with endpoint security, messaging security, web security, data protection and security management solutions.

About the Magic Quadrant
The Magic Quadrants are copyrighted 2010 by Gartner, Inc. and are reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Symantec
Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Source: Symantec

Symantec Endpoint Protection 12 Delivers Unrivaled Security with Fastest Performance

2017-07-27T00:01:08+00:00 March 2nd, 2011|Uncategorized|

Symantec announces new versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition (currently in beta), providing businesses of all sizes with advanced protection while improving system performance. Complete with advanced features to secure virtual infrastructures and powered by Insight, Symantec’s award-winning community and cloud-based reputation technology, Symantec Endpoint Protection 12 is designed to detect and block sophisticated new threats earlier and more accurately than any other security product.

Security threats have become more sophisticated and more widespread, creating a challenge for traditional signature-based security solutions. Last year, attackers unleashed more than 286 million distinct malicious programs, an average of more than nine new threats every second of every day. This explosion in malware scope and complexity is due in large part to the proliferation of easy-to-use attack toolkits—such as Zeus—which lower the barrier of entry in cybercrime. These toolkits enable hackers to continuously generate new mutated malware variants, each targeting a different victim, making traditional discovery and fingerprinting of these threats nearly impossible. According to Symantec’s Attack Toolkits and Malicious Websites Report, at least 61 percent of threat activity can be attributed to attack toolkits. As these toolkits grow in popularity, the trend towards millions of narrowly distributed, high impact threats will continue. Symantec Endpoint Protection 12 leverages Insight to provide unmatched protection against this new threat landscape.

Key Benefits

  • Unrivaled Security: Symantec Endpoint Protection 12 blocks new and unknown threats missed by traditional signature, heuristic, behavioral and HIPS-based security solutions. All of the product’s security engines are now reputation-enabled, leveraging Insight’s online reputation database to identify and block malware attacks. Symantec’s Insight has analyzed the anonymous software adoption patterns from more than 175 million customer computers to automatically derive highly accurate security ratings for more than 2.5 billion unique software files—Insight has ratings for virtually every software file, good or bad in existence. In addition, SONAR 3, the world’s first hybrid behavioral-reputation engine, blocks zero-day and highly targeted threats based on their joint behavior-reputation profile. As part of a commissioned test, the leading security testing organization, AV-Test.org, recently compared a number of major endpoint security products on their effectiveness in blocking new threats as well as cleaning up pre-existing infections. Symantec Endpoint Protection 12 (beta) received the top score against all tested competitors in both categories.
  • Fastest Performance: Symantec Endpoint Protection 12 leverages cloud-based community intelligence to reduce the overhead of virus scanning by as much as 70 percent by using Symantec Insight to automatically identify and whitelist trusted high-reputation files, resulting in fewer, faster and smarter scans. The new, Insight-driven compatible scan engine is also designed to do most of its work while computers are idle. In the latest roundup of PassMark Software’s performance test of enterprise and small business security solutions, Symantec Endpoint Protection 12 reported the fastest scan speed and was found to be twice as fast as the average security solution. Symantec Endpoint Protection 12 also used the least memory,57 percent less memory usage than the average security solution.
  • Built for Virtual Environments: Symantec Endpoint Protection 12 offers comprehensive defense against all types of attacks and is optimized for performance on virtual systems. Symantec Endpoint Protection 12 can whitelist baseline images, maintain a local Insight cache, randomize scans and updates, and automatically identify and manage virtual clients. This is above and beyond the performance improvements gained with Insight. Together these innovations dramatically reduce the load on virtual hosts, alleviating ‘AV Storms’/concurrent scans from bogging down system resources and allowing for faster, more responsive systems, which can in turn support greater density of virtual instances. Symantec is working closely with VMware to take full advantage of virtualization awareness and introspection capabilities based on VMware vShield™ technology and Symantec Endpoint Protection 12 is the first step along the optimization path for virtual environments.
  • Small Business Edition: Leveraging Insight and Sonar 3, Symantec Endpoint Protection Small Business Edition offers enterprise-class threat detection technologies and performance improvements with simple to use features such as an installation wizard, pre-configured policy settings and automated notifications and reports for small business customers. Symantec Endpoint Protection Small Business Edition meets small business needs with the fastest, most effective anti-malware capabilities in the industry. Small businesses will have peace of mind that their data is safe from cybercriminals, so that they can stay focused on growing their businesses.

Beta Registration and Availability

Presently, Symantec Endpoint Protection 12 is in an invitation-only beta and is expected to be available for public beta in April 2011. The new versions of Symantec Endpoint Protection 12 are scheduled to be generally available later this year and can be purchased through Symantec’s worldwide network of value-added authorized resellers, distributors and systems integrators or directly. For more information on Symantec Endpoint Protection and to register for the public beta, please click here.

 Quotes:

“Cyber attacks are increasing in size, scope and sophistication and companies of all sizes are at risk. Symantec Endpoint Protection 12 leverages our award winning Insight technology to give our customers —from small businesses to large enterprises—the strongest protection and fastest performance available.”
— Francis deSouza, senior vice president, Enterprise Security Group, Symantec

“As virtualization plays an increasingly critical role in the enterprise, we see a growing need for security solutions designed to secure the virtual infrastructure. We are collaborating closely with Symantec so that VMware vShield™ Endpoint technology and Symantec Endpoint Protection will work together seamlessly, further ensuring that our customers have the security solutions they need for running business-critical applications on the VMware vSphere® platform.”
— Parag Patel, vice president, Global Strategic Alliances, VMware

“The reporting capabilities are much improved, and that means a lot less time we have to spend monitoring and addressing threats to our network and systems. Symantec has developed endpoint security software that is effective against the more insidious, targeted attacks without negatively impacting system performance.”
— Christian Sosa, network security engineer, 20th Century Fox

“We’re a growing small business and our security needs become more complex each day. Since participating in the new Symantec Endpoint Protection Small Business Edition Beta program, we are seeing improved performance on our machines and more importantly, we feel relieved to know we don’t have worry about the threats out there.”
— Robert Lantrip, Owner, Ourco Welding and Industrial Supplies

“Symantec is delivering a product that will help us identify and block the new threats that are created every day. I’ve also seen dramatically improved scan times because the reputation-based security technology does not waste time scanning files with good reputations. That means our users are able to work without being slowed down or interrupted by our security software.”
— Seth Shestack, associate director of information security, Temple University

“I was particularly impressed with the Intrusion Prevention Scanning. It improves the speed of scans, significantly reducing the impact on the performance of users’ computers. Additionally, the installation time for Symantec Endpoint Protection is really fast, and with the amazing new features, I am anxious for it to be released to install for our clients as soon as possible.”
— Alex Solovyev, Network Support Technician, Networking Solutions

About Business Solutions from Symantec

Symantec helps organizations secure and manage their information-driven world with endpoint security, messaging security, web security, data protection, identity authentication and security management solutions.

About Security Technology and Response

The Security Technology and Response (STAR) organization, which includes Security Response, is a worldwide team of security engineers, threat analysts, and researchers that provides the underlying functionality, content, and support for all Symantec corporate and consumer security products, including the new Insight and SONAR 3 technologies. With Response centers located throughout the world, STAR monitors malicious code reports from more than 130 million systems across the Internet, receives data from 40,000 network sensors in more than 200 countries, and tracks more than 25,000 vulnerabilities affecting more than 55,000 technologies from more than 8,000 vendors. The team uses this vast intelligence to develop and deliver the world’s most comprehensive security protection.

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Note to Editors: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Forward-looking Statements:Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.

 Source: Symantec

Texas Children’s Hospital – Symantec Data Protection Success

2011-03-01T10:27:46+00:00 March 1st, 2011|Uncategorized|

The IT department at Texas Children’s Hospital has faced significant barriers over the past decade that introduced both cost and risks into the IT environment. First, the IT environment had to be secure and protected from attack, even to the level of the endpoint, and managed from a centralized console. Second, changes in healthcare and government regulations demanded regular and detailed security and compliance reporting. Third, as part of its deployment of Epic software for healthcare information and workflow management and the next-generation Oracle PeopleSoft upgrade, the Texas Children’s Hospital team sought to standardize data center infrastructure software for enhanced availability, improved labor productivity, and lower costs. Finally, the team wanted to centralize management of the desktop and laptop environments for greater flexibility, enhanced security, and streamlined efficiencies.A Total Operational & Economic Impact (TOEI) analysis by The Alchemy Solutions Group found the different solutions from Symantec are driving more than $11.0 million in realized and projected business value in labor productivity gains, cost savings, and cost avoidance, for Texas Children’s Hospital. The timeframe for analysis ranges from January 2001 through December 2009.

Success Details

  • Servers: 600 servers running Microsoft Windows, IBM AIX, and Red Hat Enterprise Linux
  • Applications: Epic, Oracle PeopleSoft

Organization Profile

Texas Children’s Hospital, located in the Texas Medical Center in Houston, Texas, is one of the largest full-care pediatric hospitals in the United States. Dedicated to providing the finest possible pediatric patient care, education, and research, Texas Children’s Hospital is affiliated with Baylor College of Medicine and is its primary pediatric training site. Baylor professors also are the service chiefs and staff physicians of Texas Children’s Hospital. Texas Children’s Hospital’s Integrated Delivery System includes the nation’s first pediatric HMO, Texas Children’s Health Plan, with over 200,000 covered lives and Texas Children’s Pediatric Associates, and a physician practice group that includes 150 physicians at 44 offices.

Business Value Analysis Study

Data Center Infrastructure Standardization, Security Management, IT Compliance, Backup and Restore, and High Availability

The IT department at Texas Children’s Hospital has faced significant barriers over the past decade that introduced both cost and risks into the IT environment. First, the IT environment had to be secure and protected from attack, even to the level of the endpoint, and managed from a centralized console. Second, changes in healthcare and government regulations demanded regular and detailed security and compliance reporting. Third, as part of its deployment of Epic software for healthcare information and workflow management and the next-generation Oracle PeopleSoft upgrade, the Texas Children’s Hospital team sought to standardize data center infrastructure software for enhanced availability, improved labor productivity, and lower costs. Finally, the team wanted to centralize management of the desktop and laptop environments for greater flexibility, enhanced security, and streamlined efficiencies.

A Total Operational & Economic Impact (TOEI) analysis by The Alchemy Solutions Group found the different solutions from Symantec are driving more than $11.0 million in realized and projected business value in labor productivity gains, cost savings, and cost avoidance, for Texas Children’s Hospital. The timeframe for analysis ranges from January 2001 through December 2009.

Source: Symantec

Are You Doing All You Can to Protect Your Windows Environment?

2017-07-27T00:01:09+00:00 July 6th, 2010|Uncategorized|

If your midsize business is like most, the current economic climate has stretched your IT staff and resources beyond the limit. At the same time, the risks to your business operations are increasing. According to the recently released Symantec Internet Security Threat Report, malicious code activity is growing at a record pace.

Under these conditions, it’s a real challenge to keep the Microsoft Windows environment you depend on secure, available, and well managed. The following steps can help you better safeguard this environment.

Cover all of your endpoints

Why is it so important to protect every one of your endpoint systems and servers? Just consider the impact of the Conficker worm, which targets users of Windows XP and Windows Vista. Symantec estimates that millions of computers have been infected with this threat since January. Conficker has been credited with creating nothing less than “a secure infrastructure for cybercrime.”

As a result of such threats, companies are scrambling to implement controls that better protect their endpoint systems and the communications travelling between them. But in many cases they’re not doing enough. Symantec’s recent 2009 Storage and Security in SMBs survey found that while small and midsize businesses are familiar with cyber risks and have clearly defined goals for security and storage, a surprisingly high number have yet to take even the most basic steps toward protecting their businesses, such as implementing antivirus or backing up their data.

Reduce complexity

As your IT environment becomes increasingly complex, ask yourself if you have the right tools to manage it. Continually evolving risks, as well as remote systems and mobile users, pose daily challenges.

The solutions you deploy need to be comprehensive but at the same time easy to use. They should reduce complexity, help you maintain a consistent and compliant environment, and reduce IT costs by streamlining and automating tasks. Chances are you’re also supporting more users with fewer resources these days. A secure remote management solution can make it easier for your administrators to automatically troubleshoot and correct technical problems, and to decrease problem resolution time with mobile workers.

Ensure that information is there when you need it

Ensuring that your business-critical data and systems are easily recoverable is essential for keeping your business productive and profitable. Without proper protection, it could take days and require significant expenditures to recover important business information or computer systems from an infrastructure failure, natural disaster, or simple human error. That’s why solutions that enforce and automate backup and recovery processes are needed to keep you protected.

Developing a strategy for restoring data and systems is key. So too is continuous data protection for Microsoft Exchange; after all, your email system is as vital as your phones for communicating.

Get comprehensive protection

The following best-in-class solutions can help protect your Windows environment by keeping data and systems secure, well-managed, and available:

  • Symantec Endpoint Protection combines Symantec AntiVirus technology with advanced threat prevention in a single agent and management console, providing defense against malware for laptops, desktops, and servers. Symantec integrates essential security technologies, increasing protection for Windows environments and helping lower the total cost of ownership.
  • Symantec’s industry-leading client and server management technologies help you protect local and remote systems by simplifying repetitive tasks, deploying updates, and resolving support issues quickly.
  • Symantec backup and recovery software, such as Backup Exec System Recovery and Backup Exec, provides superior protection for critical data and systems in physical and virtual environments, which in turn can keep your business up and running efficiently.
  • Symantec Protection Suite Enterprise Edition provides multiple layers of protection from the market-leading endpoint security, messaging security, data loss prevention, and data and system recovery vendor.

Conclusion

Whether you’re running Windows XP or Vista, contemplating a migration to Vista, or waiting for the upcoming Windows 7, you need to thoroughly protect your current Windows infrastructure now. That means staying ahead of risks, managing your IT environment efficiently, and ensuring that critical information is reliably available.

With a proven track record of protecting Windows environments, Symantec can provide you with the solutions you need to keep your business up, running, and growing no matter what happens.

Source:  Symantec

Survey: SMBs are Getting Serious about Information Protection

2017-07-27T00:01:10+00:00 June 30th, 2010|Uncategorized|

Symantec Study: SMBs are Getting Serious about Information ProtectionSymantec’s 2010 SMB Information Protection Survey found that small and midsized businesses are now making protecting their information their highest IT priority, as opposed to 15 months ago when a high percentage had failed to enact even the most basic safeguards.

SMBs surveyed rank data loss and cyber attacks as their top business risks, ahead of traditional criminal activity, natural disasters and terrorism. They are now spending an average of $51,000 on information protection, including computer security, backup recovery and archiving and disaster preparedness.

Of the SMBs surveyed, 74 percent are somewhat/extremely concerned about losing electronic information. In fact, 42 percent have lost confidential or proprietary information in the past. As a result, 100 percent have seen direct losses such as lost revenue or direct financial costs.

Lost devices is a big issue for SMBs. Almost two-thirds have lost devices such as laptops, smartphones or iPads in the past 12 months and 100 percent have at least some devices that have no password protection and cannot be remotely wiped of their data to protect their confidential business information if lost.

Cyber Attacks are a crucial threat to SMBs. Seventy-three percent of the respondents were victims of cyber attacks in the past year and 100 percent of those SMBs saw losses such as expensive downtime, loss of important corporate data as well as personally identifiable information of customers or employees.

Source: Symantec                                               For Details: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=smbsurvey2010

Symantec – Data Protection Solutions

2017-07-27T00:01:11+00:00 May 26th, 2010|Uncategorized|

Summary

While small and midsize businesses don’t typically generate the same amount of data that larger enterprises do, they still need the same kind of protection to ensure the timely recovery of essential business data

A recent survey has found that while small and midsize businesses are grappling with explosive data growth, the backup processes they have in place often put that data at risk.
The survey, by Rubicon Consulting, found that 92% of companies have deployed some form of data backup technology, yet 50% of them have lost data. Of the companies that lost data, approximately one-third lost sales, 20% lost customers, and one-quarter claimed the data loss caused severe disruptions to the company.
The survey also found that concerns about potential data loss run high among SMBs. Respondents rated backup as their second-highest computing priority, after defense against viruses and other malware, and ahead of issues like reducing costs and deploying new computers. And yet nearly one-third of SMBs surveyed do nothing to back up their PCs.
This article looks at some of the top backup challenges SMBs face today and the steps they need to take to ensure that their backup practices keep pace with their data growth.

Top backup challenges

While small and midsize businesses don’t typically generate the same amount of data that larger enterprises do, they still need the same kind of protection to ensure the timely recovery of essential business data. Given their smaller budgets and lack of technical expertise compared with larger enterprises, SMBs require solutions that are both cost-effective and easy to use. A recent study by the TANEJA Group emphasized that point when it identified the top challenges SMBs face today with regard to data protection:

  • Implementing comprehensive protection with minimal impact on business operations. It is estimated that data volumes are increasing by as much as 50% per year. At the same time, the demand for higher system availability is shrinking backup windows. Together, these trends are placing greater pressure on small and midsize businesses to improve backup efficiencies and deliver prompt Microsoft Windows data and system recovery. Gone are the days when critical systems could be shut down to perform backup operations.
  • Meeting increasingly stringent backup and recovery requirements. The requirements to recover lost or corrupt data to a specific point in time and reduce the overall time to restore data are becoming more stringent and are now often measured in hours instead of days. Increasingly, tape-based backup infrastructures are unable to meet these requirements.
  • Dealing with limited backup administration resources. This is a key issue particularly with smaller companies that may not have dedicated IT staff. But even larger SMBs rarely have a dedicated backup admin. According to the TANEJA Group study, “a large percentage of critical data is generated by distributed clients, and an inability to protect this data can leave SMBs open to data loss that can have a significant impact on the business.”
  • Deploying disaster recovery strategies cost-effectively. As the Rubicon Consulting survey made clear, data protection practices aren’t where they should be for most SMBs. Too often SMBs lack the resources, administrative expertise, and off-site storage required to provide true disaster recovery capabilities. Plus, as a disturbing number of news stories has made clear, the legacy practice of backing up to tape can be fraught with risk.
  • Leveraging new technologies non-disruptively. Because SMB have significant investments in their infrastructures and processes, they are unlikely to deploy new technologies unless this can be done without disrupting day-to-day business operations.
  • Maintaining a secure backup and recovery environment. The TANEJA Group is unequivocal on this topic: “SMBs need to think about this issue in two areas: providing adequate security including encryption and virus protection, plus centralized management of an entire data protection infrastructure, ensuring backup data both in-flight and at rest is protected and efficiently managed.”

Meeting backup challenges

SMB environments may not need the scale provided by enterprise backup and recovery solutions, but they do need much of the functionality. That means policy-based backups, automated operations, and centralized management should be key design tenets to help lightly staffed SMBs effectively manage system and data protection operations. Integrated disaster recovery capabilities, meanwhile, make it easier to rapidly restore complete systems. And newer technologies such as disk-based backup, snapshot backups, data deduplication, continuous data protection, and cloud-based backup options can help SMBs address shrinking backup windows, increasingly stringent RPOs/RTOs (recovery point objectives/recovery time objectives), and recovery reliability concerns.

Backup Exec for Windows Small Business Server is Symantec’s data protection solution for Microsoft Windows Small Business Server Standard and Premium Editions. Easy to install and manage, Backup Exec for Windows Small Business Server includes many valuable features with the core license:

  • Provides continuous disk-based data protection and automated disaster recovery for Microsoft Windows Small Business Server
  • Optimizes both tape and disk storage environments
  • Provides complete data protection of physical and virtual server environments
  • Supports fast and efficient backups and granular restores, allowing administrators to restore individual Microsoft Exchange email messages, Microsoft SharePoint documents, and Microsoft Active Directory user preferences in seconds
  • Offers continuous data protection for desktops and laptops, providing point-in-time recovery
  • Allows users to easily restore their own files, saving IT administration resources
  • Ensures that all data is backed up even while files are open.

Symantec Online Storage for Backup Exec

Symantec Online Storage extends the key capabilities of Backup Exec, adding the ability to store copies of backups in secure, redundant data centers managed by Symantec. Online Storage gives businesses a secure, cost-effective option for storing backup data off-site without the inconvenience and cost of tape vaulting services or other forms of off-site tape storage.

To use Symantec Online Storage, administrators simply connect to the Symantec Protection Network portal through the Backup Exec console, create an account, and select a service plan that meets their off-site storage requirements. The cost of the service is based on total storage consumed, with pricing by storage tiers. Businesses can upgrade storage tiers as their needs grow. The cost of the service can be controlled by limiting the amount of data stored in Symantec’s data centers.

Conclusion

For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company’s bottom line if that data isn’t protected. SMBs should look for solutions from a trusted provider that offer simplified management and the ability to scale as their business grows.

Symantec to Acquire VeriSign’s Security Business

2017-07-27T00:01:11+00:00 May 26th, 2010|Uncategorized|

Symantec Corp. (Nasdaq: SYMC) today announced that it has signed a definitive agreement to acquire VeriSign’s (Nasdaq: VRSN) identity and authentication business, which includes the Secure Sockets Layer (SSL) Certificate Services, the Public Key Infrastructure (PKI) Services, the VeriSign Trust Services and the VeriSign Identity Protection (VIP) Authentication Service. The combination of VeriSign’s security products, services and recognition as the most trusted brand online and Symantec’s leading security solutions and widespread distribution will enable Symantec to deliver on its vision of a world where people have simple and secure access to their information from anywhere.

“With the anonymity of the Internet and the evolving threat landscape, people and organizations are struggling to maintain confidence in the security of their interactions, information and identities online. At the same time, people’s personal and professional lives have converged and they want to use their various digital devices to access information wherever they are without jeopardizing their privacy,” said Enrique Salem, president and CEO, Symantec. “At the same time, IT is faced with the challenge of giving users the appropriate access, while ensuring that corporate data is not at risk. We believe the solution to this dilemma lies in the ubiquity of identity-based security. With the combined products and reach from Symantec and VeriSign, we are poised to drive the adoption of identity security as the means to provide simple and secure access to anything from anywhere, to prevent identity fraud and to make online experiences more user-friendly and hassle-free.”

Under the terms of the agreement, Symantec will purchase the specific assets from VeriSign, including the majority stake in VeriSign Japan, for a purchase price of approximately $1.28 billion in cash. Symantec expects the transaction to be 9 cents dilutive to non-GAAP earnings per share in fiscal year 2011, due to the purchase price accounting write down of deferred revenue, and accretive to non-GAAP earnings per share in the September 2011 quarter. The agreement is subject to customary closing conditions, including regulatory approvals, and is expected to close in the September quarter.

Enabling a New Vision of Computing
Through this acquisition, Symantec can help businesses incorporate identity security into a comprehensive framework so that IT can confidently and securely adopt new computing models, from cloud computing to social networking and mobile computing to user-owned devices, that promise operational efficiencies and freedom of choice for their employees and customers. That framework is based on five imperatives that Symantec is enabling as part of its new vision of computing and includes:

  • Identity security: proving that people and sites are who they say they are
  • Mobile and other device security: securing mobile and other devices and the information on them
  • Information protection: protecting information from loss, attack, theft and misuse and ensuring the ability to recover that information
  • Context and relevance: delivering information that is relevant to people in both their personal and professional roles
  • Cloud security: ensuring the secure delivery of applications and information from both public and private clouds

Ease-of-use, speed-of-delivery and user-driven preferences are the new imperatives in today’s workplace. People whose personal and professional lives have converged onto their digital devices increasingly expect the freedom to work from anywhere using their own devices, to use any application and to collaborate with anybody in their social network to effectively get their jobs done and simultaneously live their network-enriched lives.

IT departments struggle to meet user expectations with simple, secure and cost-effective solutions. Cloud computing can provide instantaneous scale and delivery of applications and desktops by enabling businesses to leverage services from the cloud instead of deploying applications on premise. Identity-based security gives IT the assurance that as information moves in and out of the cloud it is always protected — across any device and between the network and devices they control and those that they don’t. The user’s identity drives what information they can access and how it can be used and shared, independent of the device or application.

Creating Mutually Trusted Interactions Online

VeriSign’s SSL Certificate Services provide users with assurance that the websites they are interacting with are legitimate and secure and that their information will be safe when they share it with that site. The VeriSign check mark signifies the authenticity of the websites that users visit and assures them that any sensitive information they share with that site will be encrypted during online transactions. With more than one million web servers using VeriSign SSL certificates, and an infrastructure that processes more than two billion certificate checks daily, VeriSign has the leading share of the SSL market. The addressable market for the server and user authentication segment is estimated to reach $1.6 billion by 2013.

Symantec’s current portfolio and along with assets from VeriSign provide the depth and breadth of technologies to make identity-based security of information more universal and part of a comprehensive security solution. By combining VeriSign’s SSL Certificate Services with Symantec Critical System Protection or Protection Suite for Servers, Symantec will help organizations ensure a higher level of security on their web servers as well as verify that security, providing users with the trust and confidence necessary to do business online.

VeriSign helps organizations validate the identity of users through its VeriSign Identity Protection (VIP) user authentication service that complements the existing Identity Safe capabilities within the Norton products. The cloud-based VIP service helps organizations doing business online confirm the identities of their customers, employees and partners through user-owned digital certificates that reside on a card, token or other device such as a mobile phone, ensuring that they are giving only legitimate users access to their information. VeriSign has already issued more than two million VIP credentials to individuals and has a network of hundreds of merchants.

Through Symantec’s worldwide distribution network and footprint on more than one billion systems – including end-user devices such as laptops, desktops and smart devices, as well as servers – Symantec can facilitate the ubiquity of identity security through digital certificates for both individuals and companies. This is critical to creating mutually trusted interactions online. Merchants have added incentive to join the VIP network if user certificates are widely distributed. More merchants in the VIP network means a more secure and convenient experience for customers moving among member sites. Merchants benefit as well from knowing their customers are also trusted and secure.

Symantec can expand the VIP ecosystem by incorporating user certificates into its Norton-branded consumer products providing a channel through which consumers can easily create secure identities that can be authenticated when they do business online. In addition, the combination of the information classification capabilities of Symantec’s Data Loss Prevention solutions and Data Insight technology along with VeriSign’s identity security services, will allow us to help customers ensure that only authorized users have access to specific information.

Signifying Trust Online

The VeriSign check mark is the most recognized symbol of trust online with more than 175 million impressions every day on more than 90,000 websites in 160 countries. Symantec’s security solutions and the company’s Norton-branded suites protect more than one billion systems and users around the world. With the addition of VeriSign’s security assets, Symantec will become the leading source of trust online. Following the close of the transaction, Symantec plans to incorporate the VeriSign check mark into a new Symantec logo to convey to users that it is safe to communicate, transact commerce and exchange information online.