Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking
    • Storage

    Symantec Brass Tackles Complaints, Touts Progress

    Written by

    David Morgenstern
    Published May 9, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      SAN FRANCISCO—Symantec will seek to extend its security protection beyond the client and infrastructure to encompass Web 2.0 models and data, top executives told an assembly of partners and customers here for the annual Vision conference.

      But as the company announced new compliance packages, some attendees wondered where the company was headed on technologies such as identity management and encryption. Or the quality of support on storage-centric data lifecycle management.

      Following his keynote address, Symantec Chairman and CEO John Thompson addressed questions from the crowd. Some customers were upbeat on the companys progress in melding the storage products from Veritas Software, bought by Symantec in 2005, while others had their share of gripes.

      “We have struggled to ramp resources in support of the enterprise archiving product,” said Thompson in response to the complaint, promising that the problem is being addressed by increased training.

      /zimages/4/28571.gifRead more here about why fusion looked difficult for Veritas and Symantec.

      In his keynote address, Thompson said the company is moving to create a trusted computing environment spanning three primary areas of computing: infrastructure, which includes both client and network resources; information, or data records and resources; and now “digital interactions,” or the creation of a secure identity for electronic commerce.

      “With emerging online models, such as Web 2.0, driving more robust collaboration, we must expand our focus beyond protecting the infrastructure and the information to protecting digital interactions. As more interactions happen online, it becomes critical that each and every one of us—enterprises and consumers alike—can prove to the other that we can be trusted.”

      Thompson warned that confidence in online commerce is already being eroded because of lack of confidence in security and identity.

      “At the foundation is a process in which customers and businesses can authenticate their identities to each other,” he said, adding that the company will detail its “Security 2.0 vision” later in the week.

      However, later in the Q&A session after the keynote, Thompson was pressed about the companys plans for incorporating identity management capabilities in its software suites. He said the company currently views identity management as a part of compliance, rather than the “interactions” between customers and an e-business.

      [Identity management] is a critical component of the stack, so we have to participate. Today we participate with partners—we are agnostic in our strategy. We will embrace the technologies that other companies bring to the marketplace, and they will be manageable within the context of Symantecs security management approach,” he said.

      According to Thompson, Symantec isnt “at this moment in the identity management business—but its an area of great interest.”

      Thompson called out the companys security credentials for the audience and cautioned over changes in the market.

      He said the primary threat to information is no longer a “large-scale, fast-moving virus or worm,” and instead is a criminal enterprise, who are “more interested in anonymity than in notoriety.”

      “Last year alone, there were at least 130 large-scale data breaches, some innocent, some inside jobs by employees and some the work of skilled criminals,” Thompson said.

      /zimages/4/28571.gifSymantec beefs up its counter-phishing effort. Click here to read more.

      The executive said the company is the worlds fourth largest software vendor and invested 15 percent of its annual gross revenue into R&D.

      He said the companys security researchers operate a worldwide network of more than 24,000 sensors and track vulnerabilities in applications from more than 4,000 vendors.

      Meanwhile, while this is the ninth annual Vision conference, it was only the second opened by Thompson; the conference was formerly called Veritas Vision, named for the backup software company bought by Symantec in mid-2005. Naturally, Thompsons address drilled into the storage side of the business.

      He pointed to various compliance initiatives, how the company is addressing the expanding needs of compliance regulations as well as internal requirements within organizations and the combining of data filtering with storage, boosting the effective management of data resources.

      /zimages/4/28571.gifClick here to read how Symantecs Intelligent Archiving Partner Program works with records management, ECM and content classification vendors to make e-mail more accessible.

      For example, Thompson said that e-mail messages now may contain up to 75 percent of a companys intellectual property. But today, managers need to address other messaging formats.

      “Today, we also need to think about the information contained in instant messages, VOIP [voice over IP] connections and various forms of Web collaboration. Effectively managing your messaging environment requires real-time protection at all layers of the infrastructure. That means being able to filter out the spam and other garbage, block malicious traffic and protect the endpoint devices connecting to the enterprise,” he said.

      While concerns over encryption were on the minds of a number of attendees, the subject didnt appear to be on Thompsons hit list.

      “Encryption is one area where Symantec isnt heavily invested,” observed one systems manager of a large enterprise to eWEEK after the keynote address.

      “I want to hear where Symantec is going with encryption and how it can be integrated into a backup environment. Is the [encryption] level at the frame, the drive or software? You can do it at many levels, but there seem to be multiple schools of thought on how to integrate encryption,” he said.

      Thompson was pitched questions on encryption during his address. He pointed to other Symantec security products and strategies, such as the companys Database Security and Audit solution that monitors database transactions in real time and flags requests that dont comply with company policy or might represent an external attack.

      “We dont deliver encryption technology, per se. But there are many techniques that look at the behavior of a packet of information as it travels over the Web and [examines] the behavior pattern to see if it might be malicious or some form of problematic packet. And then take actions to mitigate risks from that packet.”

      Symantec also announced that an IT compliance solution set will be available from its value-added resellers. The solution comprises Symantec BindView Policy Manager, Control Compliance Suite, Security Information Manager, Enterprise Vault, IM Logic, Symantec Enterprise Protection, Symantec On-Demand Protection, Symantec Sygate Network Access Control, Symantec Client Security and NetBackup.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on servers, switches and networking protocols for the enterprise and small businesses.

      David Morgenstern
      David Morgenstern
      David Morgenstern is Executive Editor/Special Projects of eWEEK. Previously, he served as the news editor of Ziff Davis Internet and editor for Ziff Davis' Storage Supersite.In 'the days,' he was an award-winning editor with the heralded MacWEEK newsweekly as well as eMediaweekly, a trade publication for managers of professional digital content creation.David has also worked on the vendor side of the industry, including companies offering professional displays and color-calibration technology, and Internet video.He can be reached here.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×