Contact Us




Change Locale

Thwart targeted attacks with a layered approach to network security

Servers, Storage and Networking | Posted on April 8, 2014

If you think that running a strong antivirus program, or running Macs instead of PC’s keep you safe from aggressive cyber attacks – think again. If you’re serious about protecting your IT assets, it’s time to get proactive about your platform and think hard about vendor consolidation.

Do cyber criminals have your business in their sights?

Cyber threats have evolved from large scale attacks, to rapidly evolving targeted attacks. This means you need to look at a layered security approach to ensure your gateway, end points and data center will be protected.

In this post, we discuss how Symantec’s suite of intelligent targeted attack protection tools provides an effective platform of protection for laptops, desktops, servers, messaging and web gateways -protection that goes way beyond antivirus.

What is Symantec’s suite of security tools?

Symantec offers a pretty powerful suite of layered security solutions starting with:

  • Symantec’s Global Intelligence Network: A team of 550 researchers who collect, analyze and monitor trillions of pieces of information and more than seven billion files, URLs, and IP classifications are analyzed by Symantec to convert raw big-data into security intelligence. This intelligence is converted into predictive, proactive protection technologies that power Symantec products.
  • Data Center: Begins with Symantec Critical System Protection —a key layer of defense designed to protect both physical and virtual infrastructure. Critical System Protection’s behavior control policies enforce least privilege controls, creating a strong position for programs and users. So, if a targeted attacker accesses a server, they will perform activities that deviate from the norm to gain control of sensitive data on the machine. Critical System Protection automatically detects and blocks those deviations. Critical System Protection secures your underlying VMware infrastructure by monitoring the integrity of the ESXi hypervisor. This tool is featured in our #Critical Systems Protection video# <link>.
  • Endpoints: Powerful technologies like Network Threat Protection, Endpoint Protection, Insight, and SONAR analyze incoming network data before it reaches PCs and laptops in order to block suspicious files and monitor software behavior in real-time.
  • Gateways: At the gateway, Symantec offers proactive protection across email platforms with Symantec Messaging Gateway and Symantec Email, and Symantec Web Gateway and Web to protect against network-borne threats. Email includes Skeptic and real-time Link Following, this technology determines the true destination of any link and allows for emails with malicious, shortened links, to be blocked before they reach a recipient. Messaging Gateway includes Disarm, which removes potentially malicious active content from documents attached to an email and sends a clean version of the document to the user. Symantec Gateway protection strategies now include Disarm to prevent targeted, never-before-seen email threats.

Who benefits most from a consolidated security platform

Symantec’s suite of tools is targeted for mid-sized to large enterprises, Fortune 1,000 companies, federal, state, and local governments, healthcare and higher education institutions, and critical infrastructure operators.

Small businesses may struggle make effective use of a full suite of security tools, but Symantec does offer small business solutions.

Why we like it

There are many security vendors competing in the marketplace, and clients are looking at purchasing consolidated security solutions for the cost and management simplicities they offer.

We like Symantec’s suite of Targeted Attack Protection tools because it removes the hassle of ensuring cross-platform communication among different security products. This way, you have a streamlined, unified front to defend your network against modern threats.

What you can do right now

consolidating your security with a single vendor is a good place to start. Not only do you get one source for updates, upgrades, and support, but using a single vendor to protect multiple points in your network can actually improve your protection. Correlating threat intelligence across your network strengthens your defences and, integrates visibility and control.

The Softchoice value

We want to help you take a holistic look at your security environment. To start, see what percent of your environment is consolidated, and for ways to further simplify your security solution. If you want to talk specifics, don’t hesitate to reach out to directly to me.

Related Articles

Cloud | November 28, 2019 by Ryan Demelo

Among the biggest obstacles to IT resilience is the “data dilemma.”  That data has become “the new oil” is a well-worn cliché by now. But clichés earn that status because they originate in the truth. And it’s true that today, data drives the decision-making that moves businesses forward. Protecting it is more important than ever. […]

Cloud | November 27, 2019 by Ryan Demelo

When your system goes down, it’s a disaster – plain and simple.   Whether it’s a ransomware attack that’s shut users out of their email or a software glitch that’s knocked over an e-commerce portal, end users don’t care about the cause of an outage.   They expect the systems they rely on to be “always-on.” 

Cloud | November 14, 2019 by Ryan Demelo

Protect the data and applications critical to your business.   Data has a significant impact on the way we do business, enabling innovation, defining how we engage our customers and expand our ability to generate revenue. With IDC forecasting that by 2025 the global data sphere will grow to 175 Billion Terabytes of information, businesses will need to be more strategic and efficient in the way they manage – and protect – their data.  The increase in global cyberattacks is a […]