Skip to Content

Symantec

Innovation

Symantec’s strategy of open innovation focuses on delivering the best solutions to its customers – whether those solutions come as a result of building them internally, developing them with technology partners or acquiring them outright. Learn more about how Symantec innovates to meet customer needs.

Research and Intelligence

Security Response provides consumers and enterprises with world-class analysis, updates and protection from viruses, security risks, blended threats, vulnerabilities and ongoing cybercrime.

  • ISTR XII
  • Handling Today’s Tough Security Threats
  • Home & Home Office Monthly Security Report
  • Symantec Security Response

The Symantec Internet Security Threat Report offers analysis and discussion of threat activity over a six-month period. It covers Internet attacks, vulnerabilities, malicious code, phishing, spam, security risks, and future trends.

The current Internet security threat environment continues to be populated by lower profile, targeted attacks as cyber criminals identify new ways to steal information or provide remote access to user systems. Learn more about how attackers design threats with the intent to gain unauthorized access.

This report gives the home and home office user, an overview of Internet security concerns that may affect them and show them what you can do to protect their valuable data.

The Symantec Security Response Blog is a grass-roots communication tool for Response researchers and thought leaders to publish current information on Symantec research, threats, and outbreaks as they happen as well as the latest thinking on emerging technologies.

IT Risk Management

Over the past decade, Information Technology (IT) systems have become critical to every aspect of business resulting in a level of dependence on IT not seen in the past. As a result, IT Risk, once a minor component of operational risk, is emerging as a major focus for organizations. Learn more about how Symantec identifies four primary areas of IT risk – security, availability, performance, and compliance.

Business risks can range from everyday operational shortcomings to rare cataclysmic failures. Over the past decade, Information Technology (IT) systems have become critical to every aspect of business resulting in a level of dependence on IT not seen in the past. As a result, IT Risk, once a minor component of operational risk, is emerging as a major hazard for organizations to identify and manage. IT Risk includes security, availability, performance and compliance elements, each with its own origins and capacity for harm.

IT Risk Management can help public sector organizations avoid or mitigate risks in e-government and shared services initiatives. Public sector organizations rate themselves effective at classifying and managing IT assets, less effective at securing information assets throughout their lifecycle—and particularly weak in secure application development. Benchmarked against Best in Class standards, they show well-balanced investments across process and technology controls. Further investments in staff training and secure application development should help them improve their overall capability to manage IT Risk as they move toward shared, citizen-centered IT services.

IT Risk Management (ITRM) aligns an organization’s efforts to mitigate IT security, availability, performance, and compliance risk to its strategic and budget goals. Information Lifecycle Management is both a key technology control within ITRM and an established IT discipline in its own right. By deploying ILM within the framework of IT Risk Management, organizations classify, place, and protect information assets according to their risk-adjusted business value, deploy controls effectively, and avoid unnecessary costs.

Enterprise security is an integral part of any organization’s risk mitigation and management strategy. Organizations can transform their traditional fragmented approach to security event management to the real-time, centralized integration and management capabilities associated with today’s security operations centers (SOCs). Security operations centers provide a real-time view into a network’s security status, making a proactive approach to security a reality via risk level identification, automated alerts with actionable guidance, detailed reports, and remediation.

Data Center Management

Learn more about how Data Center Management Solutions help organizations gain control, improve service levels, and drive down costs within complex data center environments across heterogeneous storage and server platforms.

More and more employees are becoming remote users. Read more to learn what IT administrators can do to manage the increased workload created by remote offices.

This article explores common problems that IT departments face and how an effective application performance management solution can solve them.

Today’s data center managers and IT departments have more on their plates than ever before. They are tasked with driving growth and profitability while budgets and staff levels remain flat. This article offers suggestions on innovative tools that are now available to help ease the pain of meeting data center management challenges and budgetary goals.

Information Risk Management

Information Risk Management is focused on consisently enforcing content control policies across the enterprise, from e-mail and instant messaging security to archiving. Read what the Symantec experts have to say about how IT professionals can proactively prevent the risk of data leakage and policy violations.

The monthly Symantec Spam Report highlights key spam statistics such as overall volume, a breakdown of spam types and region of origin, as well as examples and analysis of emerging spam trends. Each report is issued the first week of every month by Symantec's messaging and web security team, and provides insight on trends from the month prior.

As the volume of email continues to escalate dramatically each year, email will likely continue its dominance as the hub of the corporate communications infrastructure. The convenience of email is in joined by serious security and availability risks. Read more to learn how small businesses can implement and effective email security policy.

The monthly Symantec Spam Report highlights key spam statistics such as overall volume, a breakdown of spam types and region of origin, as well as examples and analysis of emerging spam trends. Each report is issued the first week of every month by Symantec's messaging and web security team, and provides insight on trends from the month prior.

Consumer

Symantec’s consumer experts share their views on online safety for individual users, home offices, and small businesses.

Consumers are concerned with the many aspects of cybercrime including identity theft, theft or manipulation of data or services, online fraud, and extortion. Read more to learn ways that consumers can self-protect and keep safe online.

With incidents of identity theft and phishing scams making headlines around the world, consumers are wary about using the Internet. Read more to learn how traditional solutions, such as antivirus, firewall, and intrusion detection is not enough. A more comprehensive toolset is required to ensure safe transactions and communications online anytime, anywhere.