Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Symantec Utilises Security Intelligence and Experts to Deliver Cyber Threat Analysis Program

Symantec Corp. (Nasdaq: SYMC) today announced the Symantec Cyber Threat Analysis Program (CTAP), a comprehensive approach to capture and identify globally pertinent security intelligence, provide localised threat identification and deliver sound remediation and countermeasures to protect critical client information and improve overall security posture.
  • 29 July, 2009 11:16

<p>Program Mitigates Cyber Risk with Threat Identification, On-Site Intelligence Gathering and Impact Assessment to Provide Countermeasure Support</p>
<p>SYDNEY, Australia – July 29, 2009 – Symantec Corp. (Nasdaq: SYMC) today announced the Symantec Cyber Threat Analysis Program (CTAP), a comprehensive approach to capture and identify globally pertinent security intelligence, provide localised threat identification and deliver sound remediation and countermeasures to protect critical client information and improve overall security posture. CTAP provides access to one of the largest commercial repositories of cyber security-focused vulnerability data and cyber threat intelligence combined with Symantec’s broad security toolset. Symantec delivers this access through highly skilled analysts placed at a client’s site to strengthen the organisation’s defensive posture, while increasing their proactive capabilities.</p>
<p>As an addition to Symantec’s integrated, proven Security Intelligence Services, CTAP is designed to extend the customer’s view of the threat landscape and provide the resources to deliver effective risk mitigation and response efforts on demand. The program leverages Symantec’s extensive Global Intelligence Network and the broad security expertise only Symantec possesses to provide customers with detailed reports and validated intelligence on the attacks, malicious code activity, phishing and spam that organisations experience daily.</p>
<p>Symantec’s Internet Security Threat Report Volume XIV, released in April of 2009, demonstrated the extent of today’s cyber security threats. Symantec created more than 1.6 million new malicious code signatures in 2008 and blocked an average of more than 245 million attempted malicious code attacks across the globe each month during 2008. Furthermore, 90 percent of all threats detected by Symantec during the study period attempted to steal confidential information.</p>
<p>“Organisations today face the significant challenge of managing cyber security threats that arrive more quickly, are more sophisticated and allow for minimal time for proactive defense, combined with the pressure of driving down costs and leveraging past investments more effectively to enhance cyber security posture,” said Anil Chakravarthy, senior vice president, Symantec Enterprise Services. “The Symantec Cyber Threat Analysis Program mitigates cyber risk with a comprehensive approach to threat identification, intelligence gathering and validation, and delivers timely response by seasoned professionals to protect critical client information, all supported by specialised tools to enact response.”</p>
<p>As part of CTAP, Symantec Cyber Threat Analysts fuse client data and public data with CTAP intelligence to quickly identify emerging cyber security threats, determine the true nature of the attacks, develop countermeasures and enact solutions. By leveraging Symantec’s global repositories, the analysts give customers access to a depth and breadth of information and tools that are only attainable through this program, including:</p>
<p>• Attack, vulnerability and malicious code intelligence
• Phishing, spam, data leakage, spyware, adware and virus intelligence
• Underground cyber economies and honeypot network intelligence
• Symantec’s Cyber Threat Analysis Program analyst community
• Cyber research facilities and support
• Related analysis and cyber specific reports</p>
<p>Symantec provides both on-site and remote experts who customise the analysis, response and actions to meet the design specifications for each client. Deep expertise focuses on four key areas: cyber intelligence, network operations analysis, malicious code analysis and forensics. CTAP leverages sophisticated tools, including data intelligence repositories with embedded toolsets, along with Symantec internal systems, enabling CTAP analysts to identify emerging Internet security threats, develop defenses and distribute solutions to create a more secure operational environment thereby enhancing organisations’ situational awareness and response.</p>
<p>“For most organisations, dealing with today’s security threats and vulnerabilities requires significant internal resources to proactively manage risk,” said Irida Xheneti, Security Services Research Analyst at IDC. “Securing corporate assets in an era of extensive technology advancement and rapid proliferation of threats, organisations are looking for comprehensive and proactive security solutions that will enable them to quickly detect vulnerabilities and quickly mitigate them. Through the Symantec Cyber Threat Analysis Program, customers will be able to leverage proactive security intelligence and expertise to improve their organisation’s risk management posture in a cost effective manner.”</p>
<p>Symantec Global Intelligence Network</p>
<p>The Symantec Global Intelligence Network maintains massive databases from data collected around the world to identify emerging threats, develop defenses and distribute solutions. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled ability to identify, analyse, deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam. Symantec maintains 11 Security Response Centers and utilises 240,000 attack sensors to track malicious activity.</p>
<p>Pricing and Availability</p>
<p>Symantec Cyber Threat Analysis Program is now available. Pricing is based on the number of CTAP Analysts an organisation retains. For more information, please visit http://www.symantec.com/business/services/category.jsp?pcid=security.</p>
<p>About Symantec</p>
<p>Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organisations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.</p>
<p>###</p>
<p>Press Contacts:</p>
<p>Jasmin Athwal</p>
<p>Max Australia</p>
<p>+61 2 9954 3492</p>
<p>Jasmin.Athwal@maxaustralia.com.au</p>
<p>Debbie Sassine</p>
<p>Symantec</p>
<p>+61 2 8220 7158</p>
<p>debbie_sassine@symantec.com</p>

Most Popular

Brand Post

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?