Symantec Security Strategy Moves To ‘Detect and Respond’

Boldly declaring an end to the age of antivirus protection, security company Symantec is rolling out a new approach to advanced threat protection (ATP) and a roadmap of solutions that promises to tackle complex security issues.

Kicking off the new strategy, the company rolled out two new products: Symantec Managed Security Services -- Advanced Threat Protection; and Symantec Advanced Threat Protection Solution. Both aim to deliver stronger attack prevention by correlating alerts and intelligence across the company's security technologies. Both products will be available in June 2014. Pricing was not revealed in the announcement.

EUTo successfully defend against the types of targeted attacks weEUre seeing today, you need to expand the focus from prevention to detection and response,EU said Brian Dye, senior vice president of Symantec Information Security. EUNetwork security alone isnEUt going to solve the problem. Adversaries are targeting all control points from the gateway to e-mail to the endpoint. Organizations need security across these control points working together, with incident response capabilities and global information intelligence, to beat the bad guys.EU

Three Key Lessons

The information security industry recognizes three challenges: (1) targeted attacks are on the rise; (2) cybercriminals are more ruthless than ever; (3) and the multifaceted equation required to protect against these threats is growing more difficult. As Symantec sees it, despite the promise of network security-based solutions, IT departments are still left wading through massive numbers of incidents, too many false positives, and a long list of manual processes.

Combined with a lack of staffing and skill sets to handle the attacks, many organizations are vulnerable to cyber threats. ThatEUs where Symantec hopes its new solutions will come in. You could call it synergy. Symantec calls it holistic.

Either way, the idea behind the new products is to leverage the benefits when security technologies work together. The...

Comments are closed.