SlideShare a Scribd company logo
1 of 1
Download to read offline
Byline: Sherri Buri McDonald - Sunday, October 7th, 2012
SPRINGFIELD - Computer software firm
Symantec is spending $1.3 million to
create a "security operations center" at
the company's Springfield facility to
serve growing demand from its biggest
customers for storing sensitive data,
company officials said.
The center will handle highly sensitive
customer information, so center
employees will have to pass through
several security doors, including one with
a fingerprint or hand geometry scan,
company officials said.
Construction is expected to be
completed later this month or in
November, said Cris Paden, a spokesman
in Symantec's headquarters in Mountain
View, California. The highly secure,
3,364-square-foot windowless center -
officials aren't disclosing where it will be
in the Springfield facility - will have about
a dozen employees who will work in
shifts around the clock, 365 days a year.
Officials said they weren't sure how
many of those employees would be new
hires and how many might be
transferred from other jobs in
Springfield, or from other Symantec
sites.
Symantec's 1,170-employee Springfield
complex provides customer service
support for "enterprise customers" -
large businesses, universities,
government agencies and other
organizations - and performs a range of
back-office functions, such as finance
and information technology, for
Symantec's global operations. Over the
years, Symantec has shifted to or started
up in Springfield an ever-broadening
array of services.
The main function of the new security
center will be to back up sensitive data
for Symantec's enterprise customers,
said Paul Meijer, Symantec's senior
director of infrastructure operations in
Mountain View.
"Cybersecurity now - especially for
enterprises - is not so much about trying
to keep something bad from happening,"
Paden said. "It's not about building up a
brick wall around a building, or servers,
to make sure nothing can get in. That's
part of it. But another part is, if you do
get hit, have you backed up your
information? And is it accessible in a
quick and effective manner?"
Customers want reliable, effective back-
up systems and technology to ensure
secure financial transactions and
information exchange on the Web and
via "cloud" computing, he said.
Creating a security operations center in
Springfield was "a good fit," Paden said,
because "we've got a big presence up
there already for supporting our
enterprise customers."
"It speaks well for the folks in the
Eugene-Springfield area," he said. "This
stuff doesn't happen by accident. It had
to be a strategic decision. We had to put
it in a place where we felt it would be in
good hands."
Symantec's 400,000-square-foot
Springfield facility has plenty of space
and "in terms of cost it's a no-brainer,"
Paden said. "It's a little easier to build
things out in Springfield" than at
Symantec locations in California.
The Springfield security operations
center also will be a back-up for
Symantec's half-dozen other security
operations centers around the world,
including one in Mountain View, he said.
Employees who work in the security
operations center will need to pass a
criminal background check, as well as a
credit check "to make sure there's no
financial malfeasance in their
background," Meijer said.
The credit check would rule out
someone, for example, with a large
gambling debt, who might be tempted to
turn over customer information to
someone who promised to pay off that
debt, he said.
Just to gain access to the center,
employees will need to pass through
several sets of doors: one that reads a
magnetic badge, another which requires
the employee to enter a pin number and
another that, requires a "biometric"
check, such as a fingerprint or hand
geometry scan, Meijer said.
"We want to make sure that we're
treating the data the way that the
customer would want their own internal
people to treat it," he said.
Founded in 1982, Symantec built a name
for itself with its Norton antivirus
software. Over the years, it has acquired
expertise in Internet security, which has
become a major focus with the growing
trends of mobile devices and cloud
computing.
The Register-Guard • 3500 Chad Drive • Eugene, OR •
97408 / (541) 485-1234 / a daily newspaper published in
Eugene, Oregon, United States. The paper serves the
Eugene-Springfield area, as well as the Oregon Coast,
Umpqua River Valley, and surrounding areas, and has a
circulation of around 52,000 Monday through Friday.

More Related Content

What's hot

Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4jNeo4j
 
Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Jonathan Sinclair
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Information Security
Information SecurityInformation Security
Information SecurityBrian Hacker
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020Ulf Mattsson
 
How to prevent being hacked in 2018
How to prevent being hacked in 2018How to prevent being hacked in 2018
How to prevent being hacked in 2018ringcaptchausa
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesVISTA InfoSec
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo SecurityMarcos Ortiz Valmaseda
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentBee_Ware
 

What's hot (20)

Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
 
Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Information Security
Information SecurityInformation Security
Information Security
 
Inventory management software
Inventory management softwareInventory management software
Inventory management software
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
 
How to prevent being hacked in 2018
How to prevent being hacked in 2018How to prevent being hacked in 2018
How to prevent being hacked in 2018
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security
 
Implementing your APIs with zero trust
Implementing your APIs with zero trustImplementing your APIs with zero trust
Implementing your APIs with zero trust
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 

Viewers also liked

аренда как бизнес петербургская 9
аренда как бизнес петербургская 9аренда как бизнес петербургская 9
аренда как бизнес петербургская 9arenda-servis-kazan
 
аренда как бизнес мусина 1
аренда как бизнес мусина 1аренда как бизнес мусина 1
аренда как бизнес мусина 1arenda-servis-kazan
 
CHECKLIST DE SEO ONPAGE - Mario Melo
CHECKLIST DE SEO ONPAGE - Mario MeloCHECKLIST DE SEO ONPAGE - Mario Melo
CHECKLIST DE SEO ONPAGE - Mario MeloMario Melo
 
Father's Development paper
Father's Development paperFather's Development paper
Father's Development paperZainab Juhoor
 
WordUp Łódź - Sage - Twoje szablony będą jak supermodelki
WordUp Łódź - Sage - Twoje szablony będą jak supermodelkiWordUp Łódź - Sage - Twoje szablony będą jak supermodelki
WordUp Łódź - Sage - Twoje szablony będą jak supermodelkiInterSynergy
 
STI Policy for Iraq
STI Policy for IraqSTI Policy for Iraq
STI Policy for IraqAli Albeer
 
Właściwości polimerów, reologia
Właściwości polimerów, reologiaWłaściwości polimerów, reologia
Właściwości polimerów, reologiaMałgorzata Zaitz
 
Repsol, a new company
Repsol, a new companyRepsol, a new company
Repsol, a new companyRepsol
 
Est29 2 septiembre 16
Est29   2 septiembre 16Est29   2 septiembre 16
Est29 2 septiembre 16emmstone
 
Top 50 Cute Love Sayings, Love Images With Quotes
Top 50 Cute Love Sayings, Love Images With QuotesTop 50 Cute Love Sayings, Love Images With Quotes
Top 50 Cute Love Sayings, Love Images With QuotesSimpy Saini
 
презентация торговая площадь на ул. восстания 67
презентация торговая площадь на ул. восстания 67презентация торговая площадь на ул. восстания 67
презентация торговая площадь на ул. восстания 67KonstantinButenin
 
H Aθήνα γίνεται η πιο ισχυρή πόλη
H Aθήνα γίνεται η πιο ισχυρή πόληH Aθήνα γίνεται η πιο ισχυρή πόλη
H Aθήνα γίνεται η πιο ισχυρή πόληPapadeli Language School
 
Repsol: Plan Estratégico 2016-2020
Repsol: Plan Estratégico 2016-2020Repsol: Plan Estratégico 2016-2020
Repsol: Plan Estratégico 2016-2020Repsol
 
ротфорт д.в. вебінар 21.09.16
ротфорт д.в. вебінар 21.09.16ротфорт д.в. вебінар 21.09.16
ротфорт д.в. вебінар 21.09.16Yulya Yuliana
 

Viewers also liked (20)

аренда как бизнес петербургская 9
аренда как бизнес петербургская 9аренда как бизнес петербургская 9
аренда как бизнес петербургская 9
 
10.) Questionnaire
10.) Questionnaire10.) Questionnaire
10.) Questionnaire
 
elaf1028kishimoto
elaf1028kishimotoelaf1028kishimoto
elaf1028kishimoto
 
question six
question sixquestion six
question six
 
аренда как бизнес мусина 1
аренда как бизнес мусина 1аренда как бизнес мусина 1
аренда как бизнес мусина 1
 
CHECKLIST DE SEO ONPAGE - Mario Melo
CHECKLIST DE SEO ONPAGE - Mario MeloCHECKLIST DE SEO ONPAGE - Mario Melo
CHECKLIST DE SEO ONPAGE - Mario Melo
 
Father's Development paper
Father's Development paperFather's Development paper
Father's Development paper
 
pp linkedin
pp linkedinpp linkedin
pp linkedin
 
WordUp Łódź - Sage - Twoje szablony będą jak supermodelki
WordUp Łódź - Sage - Twoje szablony będą jak supermodelkiWordUp Łódź - Sage - Twoje szablony będą jak supermodelki
WordUp Łódź - Sage - Twoje szablony będą jak supermodelki
 
STI Policy for Iraq
STI Policy for IraqSTI Policy for Iraq
STI Policy for Iraq
 
Właściwości polimerów, reologia
Właściwości polimerów, reologiaWłaściwości polimerów, reologia
Właściwości polimerów, reologia
 
Repsol, a new company
Repsol, a new companyRepsol, a new company
Repsol, a new company
 
Est29 2 septiembre 16
Est29   2 septiembre 16Est29   2 septiembre 16
Est29 2 septiembre 16
 
Metody badań polimerów
Metody badań polimerówMetody badań polimerów
Metody badań polimerów
 
Top 50 Cute Love Sayings, Love Images With Quotes
Top 50 Cute Love Sayings, Love Images With QuotesTop 50 Cute Love Sayings, Love Images With Quotes
Top 50 Cute Love Sayings, Love Images With Quotes
 
презентация торговая площадь на ул. восстания 67
презентация торговая площадь на ул. восстания 67презентация торговая площадь на ул. восстания 67
презентация торговая площадь на ул. восстания 67
 
Οι πιτσιρίκοι του Δ. Ψαθά
Οι πιτσιρίκοι του Δ. ΨαθάΟι πιτσιρίκοι του Δ. Ψαθά
Οι πιτσιρίκοι του Δ. Ψαθά
 
H Aθήνα γίνεται η πιο ισχυρή πόλη
H Aθήνα γίνεται η πιο ισχυρή πόληH Aθήνα γίνεται η πιο ισχυρή πόλη
H Aθήνα γίνεται η πιο ισχυρή πόλη
 
Repsol: Plan Estratégico 2016-2020
Repsol: Plan Estratégico 2016-2020Repsol: Plan Estratégico 2016-2020
Repsol: Plan Estratégico 2016-2020
 
ротфорт д.в. вебінар 21.09.16
ротфорт д.в. вебінар 21.09.16ротфорт д.в. вебінар 21.09.16
ротфорт д.в. вебінар 21.09.16
 

Similar to Symantec SOC - Register-Guard Oct 2012

Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceXenith Document Systems Ltd
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0PT Datacomm Diangraha
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-teamKleomenis Symeon
 
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...Steven Wertheim
 
IT Security News & Case Studies
IT Security News & Case StudiesIT Security News & Case Studies
IT Security News & Case StudiesDani Wannous
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 

Similar to Symantec SOC - Register-Guard Oct 2012 (20)

Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-team
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
 
IT Security News & Case Studies
IT Security News & Case StudiesIT Security News & Case Studies
IT Security News & Case Studies
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 

More from Grant Chapman

The Rise of the ECO PC
The Rise of the ECO PCThe Rise of the ECO PC
The Rise of the ECO PCGrant Chapman
 
Symantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZSymantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZGrant Chapman
 
Symantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZSymantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZGrant Chapman
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZGrant Chapman
 
Duelling for the desktop
Duelling for the desktopDuelling for the desktop
Duelling for the desktopGrant Chapman
 
Distant desktops in outsource shift
Distant desktops in outsource shiftDistant desktops in outsource shift
Distant desktops in outsource shiftGrant Chapman
 

More from Grant Chapman (6)

The Rise of the ECO PC
The Rise of the ECO PCThe Rise of the ECO PC
The Rise of the ECO PC
 
Symantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZSymantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZ
 
Symantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZSymantec Secure Email Service - KAZ
Symantec Secure Email Service - KAZ
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZ
 
Duelling for the desktop
Duelling for the desktopDuelling for the desktop
Duelling for the desktop
 
Distant desktops in outsource shift
Distant desktops in outsource shiftDistant desktops in outsource shift
Distant desktops in outsource shift
 

Symantec SOC - Register-Guard Oct 2012

  • 1. Byline: Sherri Buri McDonald - Sunday, October 7th, 2012 SPRINGFIELD - Computer software firm Symantec is spending $1.3 million to create a "security operations center" at the company's Springfield facility to serve growing demand from its biggest customers for storing sensitive data, company officials said. The center will handle highly sensitive customer information, so center employees will have to pass through several security doors, including one with a fingerprint or hand geometry scan, company officials said. Construction is expected to be completed later this month or in November, said Cris Paden, a spokesman in Symantec's headquarters in Mountain View, California. The highly secure, 3,364-square-foot windowless center - officials aren't disclosing where it will be in the Springfield facility - will have about a dozen employees who will work in shifts around the clock, 365 days a year. Officials said they weren't sure how many of those employees would be new hires and how many might be transferred from other jobs in Springfield, or from other Symantec sites. Symantec's 1,170-employee Springfield complex provides customer service support for "enterprise customers" - large businesses, universities, government agencies and other organizations - and performs a range of back-office functions, such as finance and information technology, for Symantec's global operations. Over the years, Symantec has shifted to or started up in Springfield an ever-broadening array of services. The main function of the new security center will be to back up sensitive data for Symantec's enterprise customers, said Paul Meijer, Symantec's senior director of infrastructure operations in Mountain View. "Cybersecurity now - especially for enterprises - is not so much about trying to keep something bad from happening," Paden said. "It's not about building up a brick wall around a building, or servers, to make sure nothing can get in. That's part of it. But another part is, if you do get hit, have you backed up your information? And is it accessible in a quick and effective manner?" Customers want reliable, effective back- up systems and technology to ensure secure financial transactions and information exchange on the Web and via "cloud" computing, he said. Creating a security operations center in Springfield was "a good fit," Paden said, because "we've got a big presence up there already for supporting our enterprise customers." "It speaks well for the folks in the Eugene-Springfield area," he said. "This stuff doesn't happen by accident. It had to be a strategic decision. We had to put it in a place where we felt it would be in good hands." Symantec's 400,000-square-foot Springfield facility has plenty of space and "in terms of cost it's a no-brainer," Paden said. "It's a little easier to build things out in Springfield" than at Symantec locations in California. The Springfield security operations center also will be a back-up for Symantec's half-dozen other security operations centers around the world, including one in Mountain View, he said. Employees who work in the security operations center will need to pass a criminal background check, as well as a credit check "to make sure there's no financial malfeasance in their background," Meijer said. The credit check would rule out someone, for example, with a large gambling debt, who might be tempted to turn over customer information to someone who promised to pay off that debt, he said. Just to gain access to the center, employees will need to pass through several sets of doors: one that reads a magnetic badge, another which requires the employee to enter a pin number and another that, requires a "biometric" check, such as a fingerprint or hand geometry scan, Meijer said. "We want to make sure that we're treating the data the way that the customer would want their own internal people to treat it," he said. Founded in 1982, Symantec built a name for itself with its Norton antivirus software. Over the years, it has acquired expertise in Internet security, which has become a major focus with the growing trends of mobile devices and cloud computing. The Register-Guard • 3500 Chad Drive • Eugene, OR • 97408 / (541) 485-1234 / a daily newspaper published in Eugene, Oregon, United States. The paper serves the Eugene-Springfield area, as well as the Oregon Coast, Umpqua River Valley, and surrounding areas, and has a circulation of around 52,000 Monday through Friday.