Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Symantec Aims for Data Integrity

    Written by

    Dennis Fisher
    Published November 1, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Symantec Corp. is launching a new corporate strategy fusing security and risk management, a concept that the company is calling information integrity.

      The strategy, unveiled at a series of simultaneous events around the world last week, is not entirely new and is, in part, a restatement of concepts that Symantec and other companies have been focusing on for some time. The heart of the idea is that for information to be useful to an organization it must be both highly available and secure. If either condition is not met, the data is useless. This is the same concept behind the decades-old discipline of information assurance.

      In Symantecs world, the key to delivering information integrity is the integration of vulnerability assessment, attack prevention, threat mitigation and disaster recovery. The company plans to integrate more of the products in its ever-expanding portfolio to make it easier for customers to protect their networks with fewer potential points of failure, officials said.

      Symantec is also adding new technologies to its products, including generic exploit-blocking. This capability can be used to analyze new vulnerabilities and “fingerprint” them so the security device will recognize and block attacks targeting those particular weaknesses.

      “Were aiming for more integration with fewer moving parts,” said Robert Clyde, vice president and chief technology officer at Symantec, based in Cupertino, Calif. “As a general rule, well be looking for areas of integration and consolidation.”

      This theme of integration and consolidation is not unique to Symantec. Many of the companys competitors, including McAfee Inc. and Computer Associates International Inc., have been following similar paths recently. McAfee, in particular, has been paring down its product line and jettisoning anything that isnt directly related to security in general and intrusion prevention specifically. Like Symantec, McAfee has been adding new features and capabilities to its integrated security appliances and intrusion prevention offerings.

      /zimages/2/28571.gifClick here to read about McAfees acquisition of vulnerability management specialist Foundstone.

      As part of the new strategy, Symantec last week announced two updated products, ESM (Enterprise Security Manager) 6.1 and Symantec Gateway Security 4.0. The new version of ESM includes features to aid with compliance reporting and preconfigured modules for Sarbanes-Oxley Act and Gramm-Leach-Bliley Act assessments.

      Another key component of the information integrity strategy as articulated by Symantec is the companys Live Update service. The service typically is used to send updated anti-virus signatures to users of the companys Norton AntiVirus products. Going forward, Symantec will be sending the exploit-blocking fingerprints via Live Update, as well, Clyde said. The key, he added, is to get the customers updates as soon as possible once the vulnerability is analyzed.

      Safe and Sound
      Technologies in Symantecs new information integrity strategy:

      • Risk assessment
      • Generic exploit-blocking
      • Endpoint compliance-checking

      /zimages/2/28571.gifCheck out eWEEK.coms Security Center for the latest security news, reviews and analysis.

      /zimages/2/77042.gif

      Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.