Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Symantec Announces New Proactive Behaviour-Based Host Intrusion Prevention Solution

  • 16 March, 2006 17:15

<p>AUSTRALIA, Sydney - 16 March 2006. Symantec Corp. has announced Symantec Critical System Protection 5.0, a proactive behaviour-based intrusion prevention solution for multi-layered protection of servers and critical clients running on Windows, UNIX and Linux platforms. Now available, Symantec Critical System Protection provides zero-day protection against application and operating system attacks, enhanced auditing and compliance enforcement, enterprise reporting capabilities, and improved manageability of heterogeneous environments from a single management console. Using a unique combination of signature and behaviour-based detection, this enterprise class product helps prevent system downtime while protecting critical information assets.</p>
<p>"Preventing an information security breach or loss of customer data on critical systems is paramount to avoiding possible damage to a company's brand reputation," said Chirantan "CJ" Desai, director of product management for client and host security at Symantec. "Backed by Symantec's global intelligence network, Symantec Critical System Protection integrates real time behaviour-based intrusion prevention with host intrusion detection to protect and respond against known and unknown attacks."</p>
<p>Symantec Critical System Protection is part of a comprehensive portfolio of endpoint security for both managed and unmanaged end point devices, and enables enterprises to regain control of network security and ensure compliance across the organisation. When deployed alongside Symantec Client Security or Symantec AntiVirus Corporate Edition, Symantec Critical System Protection specifically safeguards applications and operating systems without the need for a known signature or patch. It delivers powerful behaviour-based intrusion prevention technology for network protection, exploit prevention, system control, along with system audit and alerting capabilities. Buffer overflow and memory-based attack protection provide added defence against the most sophisticated attacks, while a high-performance firewall monitors network traffic with the ability to block inbound and outbound connections by application, port, protocol and IP address range.</p>
<p>"Compliance management and zero-day protection of critical assets is a top priority for today's leading enterprises," said Jon Oltsik, senior analyst with Enterprise Strategy Group. "Symantec Critical System Protection provides a comprehensive, enterprise class security solution with multiple layers of protection to guard against new emerging and blended threat strategies."</p>
<p>A centralised management console allows Symantec Critical System Protection to manage end point systems across large heterogeneous IT environments. Using the management console, security policies can be set to harden and protect systems by creating a shell around each application to define acceptable behaviour and user actions to prevent exploitation or misuse. Advanced auditing, monitoring and alerting capabilities along with enterprise class reporting provides detailed, granular analysis to ensure adherence to regulatory compliance requirements. Log consolidation and monitoring capabilities allow for complete event discovery and can be forwarded to Symantec Security Information Manager for correlation analysis and to conduct computer forensic investigations. In addition, the management console can be configured to deliver automatic notification alerts to ensure rapid response to high priority incidents.</p>
<p>To reduce the complexity of administration, Symantec Critical System Protection provides out-of-the-box configurable security policies to lock down the operating system, applications, and databases. These policies automatically adapt to the operating system and applications installed, including custom in-house applications, thereby eliminating the need to configure different policies based on the type of application or machine. Symantec Critical System Protection also prevents unauthorised executables from being introduced and run, along with "de-escalation" of administrative user privileges to restrict access and protect against malicious behaviour. Furthermore, IT administrators can configure policy controls over device management, such as USB drive access, CD ROM writing and non-VPN protected wireless connections to prevent the leakage of sensitive customer information.</p>
<p>Availability</p>
<p>Symantec Critical System Protection 5.0 is now available through Symantec's worldwide network of value-added resellers, distributors and systems integrators. Organisations seeking a reseller or distributor should contact Symantec at http://enterprisesecurity.symantec.com.</p>
<p>About Symantec</p>
<p>Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at www.symantec.com.</p>
<p>###</p>
<p>NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in US dollars and are valid only in the United States.</p>
<p>Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.</p>
<p>CONTACT:
Antoinette Trovato
Symantec Australia
Phone: +612 8879 1173
Email: atrovato@symantec.com</p>
<p>Anastasia Jones
Max Australia
+612 9954 3492
maxinformation@maxaustralia.com.au</p>

Most Popular

Brand Post

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?