Symantec Launches Attack Preparation Service
Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
Security applications maker Symantec introduced a new package aimed at helping companies prepare for emerging attacks such as so-called zero day exploits on June 28.
Tabbed as the Symantec Threat and Vulnerability Management Program, the offering combines elements of the software manufacturer's latest anti-virus and network intrusion applications with expertise garnered from its professional services division.
The goal of the service is to create a process for dealing with new attacks as they happen, rather than attempting to address the fallout from such threats after they have already arrived.
By allowing enterprise customers to create a strategy for managing their network defenses against today's rapidly-evolving forms of malware, and tailoring the plan to meet the logistics of a company's specific infrastructure, the anti-virus market leader believes it can greatly improve customers' preparation for dealing with new threats.
Company executives said that a prime example of how the service might be used is in helping companies get ready to deal with the list of security updates issued by Microsoft for its Windows products each month.
While customers typically scramble to distribute the patches and update user machines, the Threat and Vulnerability Management Program will allow firms to be ready to address whatever types of issues Microsoft may report, said Ted Donat, group product manager at Symantec.
The software maker decided to create the program based on experiences working with two customers, a U.S. state government and a large multinational corporation, who had asked the firm to help them create a set of guidelines for responding to attacks.
Donat said that Symantec has offered services that deliver some of the same capabilities in the past, such as via its Global Intelligence Service, but the new package aims to provide a more comprehensive collection of technology and vulnerability response best practices.