1) The document discusses Starhome, a leading provider of roaming mobile services with 178 operators in 118 countries. It focuses on how Starhome implemented Symantec's security suite to improve their security posture and gain operational efficiencies.
2) Previously, Starhome used separate security solutions for endpoints, messaging, and the web gateway. This made management difficult. They implemented Symantec Protection Suite for a unified solution.
3) The implementation was led by IT manager Yaniv Dinar and provided benefits like easier management, improved security, and reduced support calls. Features like web filtering and personal firewalls closed security gaps for Starhome.
The document discusses the security challenges posed by the Internet of Things (IoT). It states that while the IoT concept and some security issues are not new, the scale of IoT networks, the heterogeneity of devices, reliance on cloud computing, and exposure of connected devices create new challenges for securing the IoT. Some key issues mentioned are that IoT is developing faster than laws and standards around security, different devices and platforms may have incompatible security measures, and many potential problems are simply existing security issues magnified by the massive scale of IoT infrastructure. Securing the IoT is seen as both a technological and business challenge that boards of directors need to address due to litigation risks for brands.
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
The document discusses security issues in the telecommunications industry based on the speaker's 10 years of experience penetration testing telecom operators. It notes that telecom vendors sell insecure systems, operators lack security expertise, and sophisticated hackers are increasingly targeting telecom networks. The speaker describes how they were able to hack into 100% of operators via web apps and 90% via other access points. The document argues the industry has a 'head in the sand' approach that leaves critical infrastructure at risk.
John Yessis is a sales director at EUS Networks. John Yessis is a professional in the telecom field. John Yessis specializes in providing Voice over IP (VoIP) systems and cloud technologies.
The document provides an agenda for a wireless security lecture. The agenda includes an introduction that defines network security and discusses virus, worm, trojan, and intrusion attacks. It also outlines Bapinger's wireless security solutions and concludes with key points about securing today's networks.
Cyber Defence East Africa Summit 2015 invitation baipgroup
The Cyber Defence East Africa Summit 2015 (CDEA2015) is the third annual cyber security conference organized by Norway Registers Development East Africa Ltd from August 11-13, 2015 in Dar es Salaam, Tanzania. The conference will discuss topics such as incident response, digital forensics, and mobile/ATM security solutions. It is aimed at CEOs, IT professionals, and cyber security practitioners and will feature international experts and representatives from government institutions and banks.
The document discusses the history of automotive safety features like seatbelts and draws a parallel to the current state of cybersecurity. It notes that just as it took decades for seatbelts to become widely adopted, cybersecurity protections are still in their infancy. However, the document argues that trusted computing technologies can now provide "cybersecurity seatbelts" to help secure systems and networks from threats. It encourages organizations to proactively implement these trusted computing defenses to better protect their data and systems.
The document discusses the security challenges posed by the Internet of Things (IoT). It states that while the IoT concept and some security issues are not new, the scale of IoT networks, the heterogeneity of devices, reliance on cloud computing, and exposure of connected devices create new challenges for securing the IoT. Some key issues mentioned are that IoT is developing faster than laws and standards around security, different devices and platforms may have incompatible security measures, and many potential problems are simply existing security issues magnified by the massive scale of IoT infrastructure. Securing the IoT is seen as both a technological and business challenge that boards of directors need to address due to litigation risks for brands.
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
The document discusses security issues in the telecommunications industry based on the speaker's 10 years of experience penetration testing telecom operators. It notes that telecom vendors sell insecure systems, operators lack security expertise, and sophisticated hackers are increasingly targeting telecom networks. The speaker describes how they were able to hack into 100% of operators via web apps and 90% via other access points. The document argues the industry has a 'head in the sand' approach that leaves critical infrastructure at risk.
John Yessis is a sales director at EUS Networks. John Yessis is a professional in the telecom field. John Yessis specializes in providing Voice over IP (VoIP) systems and cloud technologies.
The document provides an agenda for a wireless security lecture. The agenda includes an introduction that defines network security and discusses virus, worm, trojan, and intrusion attacks. It also outlines Bapinger's wireless security solutions and concludes with key points about securing today's networks.
Cyber Defence East Africa Summit 2015 invitation baipgroup
The Cyber Defence East Africa Summit 2015 (CDEA2015) is the third annual cyber security conference organized by Norway Registers Development East Africa Ltd from August 11-13, 2015 in Dar es Salaam, Tanzania. The conference will discuss topics such as incident response, digital forensics, and mobile/ATM security solutions. It is aimed at CEOs, IT professionals, and cyber security practitioners and will feature international experts and representatives from government institutions and banks.
The document discusses the history of automotive safety features like seatbelts and draws a parallel to the current state of cybersecurity. It notes that just as it took decades for seatbelts to become widely adopted, cybersecurity protections are still in their infancy. However, the document argues that trusted computing technologies can now provide "cybersecurity seatbelts" to help secure systems and networks from threats. It encourages organizations to proactively implement these trusted computing defenses to better protect their data and systems.
Peter Wood and his team conduct ethical hacking engagements for multi-national organisations in varied business sectors. Peter will address the top three emerging threats, how they affect the attack surface of a typical business and how they can be exploited.
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
This document summarizes common and emerging phishing techniques and methods to mitigate associated security risks. It begins with a brief history of phishing, including early phishing scams targeting AOL users in the 1990s. It then describes classic phishing attack vectors such as social engineering techniques that exploit human curiosity, fear, and empathy. One such classic technique is distributing malware via email attachments or links that appear to be gifts or prizes but instead install Trojan horse programs on victims' computers. The document aims to educate about phishing risks and prevention.
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
The document summarizes the first LINE-Intertrust Security Summit held in Tokyo on May 17, 2017. The summit brought together business, research, and security product leaders to discuss challenges around internet security and potential solutions. It notes that the original design of the internet did not consider security, and that current efforts are focused on overlaying new security technologies to address ongoing threats and attacks against consumers and infrastructure. The goal of the conference was to present research on threats and solutions to help create a safer internet.
This document discusses security risks associated with wireless access and mobile devices. It provides 10 steps for improving mobile security, including enforcing policies, password protection, antivirus software, encryption of files, and device lockdown. It also discusses threats like rogue wireless access, denial of service attacks, and the risks of unencrypted laptop hard drives. It recommends using mobile VPNs with encryption, authentication, and data encapsulation to secure over-the-air transmissions. Companies can also use solutions that detect and block rogue access points and wireless clients to prevent unauthorized access to networks.
1. The document discusses security strategies for unified communications (UC) systems. It covers common threats like toll fraud, denial of service attacks, man-in-the-middle attacks, and social engineering.
2. The document provides a history of security issues with telephone networks and explains how UC systems are now more vulnerable since they operate over the internet.
3. It emphasizes the importance of security for UC given its importance for business communications and operations. Basic security practices like strong passwords, firewalls, VPNs, updating software, and disabling unused services are recommended.
The document discusses several trends in physical security systems moving from analog to IP-based networks:
1) More surveillance cameras, access controls, and sensors are connecting to IP networks which allows for features like priority tagging, automatic device discovery, and network access control.
2) HD video and video analytics software are improving surveillance capabilities like facial recognition while reducing bandwidth needs.
3) Building access controls are integrating with IP networks to automate policies and incident response.
4) Open standards are promoting interoperability between physical security systems and other communication technologies.
Making home security simple and accessible by connecting people and their homes.
We believe in great design and effortless experience
Launching complete smart home security delivered from a single device with no installation.
NVIS is developing an encrypted overlay network that provides secure connectivity without restrictions. It uses existing public internet infrastructure but is hidden and unhackable. The software allows users to dynamically choose who is in their network groups. This creates instant secure networks with low costs. NVIS aims to address big problems like frequent hacker attacks and privacy issues that plague the current internet, by building security and privacy into a new type of network.
This document is the fourth quarter 2009 issue of the e-Security newsletter published by CyberSecurity Malaysia. It contains summaries of several articles related to cybersecurity topics such as cryptography, social engineering techniques, malware, and cyber defense. The issue also includes a message from the head of CyberSecurity Malaysia highlighting security events held in the last quarter and emphasizing the importance of cybersecurity awareness. It concludes by inviting readers to contribute articles to future issues and provides contact information for CyberSecurity Malaysia.
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
This document summarizes a presentation given by Koichi Moriyama of NTT DOCOMO on their deployment of FIDO authentication. It discusses how NTT DOCOMO implemented FIDO standards to enable passwordless login for their d ACCOUNT system using biometric authentication on supported devices. It provides details on the motivation, user experience, and security approach taken. It also discusses future goals of using mobile devices as the primary authentication method and creating a world without passwords.
This document provides a summary of Denyse L. Cowan's contact information, career history, and technical skills. It summarizes her experience as an IT Security Analyst and Security Awareness Specialist, including roles at SOCAN, CGI, and Royal & Sun Alliance. Her technical skills include firewalls, antivirus software, vulnerability scanning tools, and network administration. She is studying for the CISSP certification exam in July.
This document announces the 3rd Annual Chief Information Security Officer Middle East Summit & Roundtable to be held January 31-February 2, 2011 in Dubai, UAE. The event brings together CISOs and IT security professionals from business and government to share best practices for addressing rapidly changing security challenges in the Middle East region. The agenda includes keynote speeches and panels on topics such as securing mobility solutions, data breaches, identity management, cloud security, and emerging cyber threats. Attendees will have opportunities to network and benchmark security strategies with international peers.
Application security as crucial to the modern distributed trust modelLINE Corporation
The document discusses the need for application layer security given three modern trends: scale, hyperconnectivity, and the merger of cyber and physical worlds. It notes that by 2020 there will be billions of connected people and devices generating huge amounts of data. Application security is crucial because isolation defeats connectivity, and ransomware and other malware pose risks. The document argues that software self-defense through mechanisms within devices and applications can help address these issues, providing security that is simple, self-maintaining, and inexpensive.
MarkAny is a Korean company that develops digital rights management and security technologies to protect corporate intellectual property, with over $8 million in annual sales and a focus on document watermarking, encryption, and access controls. Their Document Safer solution manages the distribution and use of protected documents through encryption, access controls, and auditing to prevent unauthorized copying, distribution, or access to sensitive business information. Major clients of MarkAny include Samsung Electronics, LG Electronics, and other large Korean corporations.
1) The document discusses the history and future of cryptography, including the transition from symmetric to public key cryptography and challenges with the blackbox security model.
2) It introduces the concept of whitebox cryptography as a way to obscure cryptographic keys and algorithms when they are used in unprotected environments.
3) The future of cryptography depends on finding practical solutions to theoretical problems like obfuscation and addressing attacks on both software and hardware implementations.
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.
In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
European Cyber Security Perspectives 2016Omer Coskun
This document summarizes a case of phishing attacks carried out by an organized criminal group targeting email accounts and using KPN's infrastructure to send large volumes of phishing emails. KPN-CERT and the KPN Abusedesk tracked the activities of the group over a long period. The group registered fake domains and sent phishing emails from static IP addresses. When an IP address was blocked, the group would find nearby open wireless networks through "wardriving" and use those new IP addresses to continue their attacks. The persistence and organization of the group posed a serious threat, but they made mistakes that allowed KPN to track their activities and build a case for potential prosecution.
Managed Security Service Providers like Netmagic can improve your security posture by monitoring services with advanced tools and expertise. Enjoy increased availability and reliability of networks; avoid the risk security breaches with Netmagic.
Not so long ago, the only way to access a new application was to install it from a floppy disk.
Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office,
at home, in cafés, on the street, even on the beach. We live in a world where we are connected
all the time. This influences our lifestyle, our interests and attitude, it changes the way we work.
This means a whole new era for the software industry. And this era should be called “Cloud”.
802 Secure develops software defined radio and big data analytics to secure wireless networks and the Internet of Things. The company's technology detects and prevents exploitation of advanced wireless threats using deceptive networking techniques. 802 Secure's products include a real-time wireless security system to protect first responder communications and a Wireless Risk Audit Tool to identify vulnerabilities across multiple wireless spectrums before incidents occur. The company aims to secure the growing number of wireless devices as the Internet of Things market expands dramatically.
Peter Wood and his team conduct ethical hacking engagements for multi-national organisations in varied business sectors. Peter will address the top three emerging threats, how they affect the attack surface of a typical business and how they can be exploited.
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
This document summarizes common and emerging phishing techniques and methods to mitigate associated security risks. It begins with a brief history of phishing, including early phishing scams targeting AOL users in the 1990s. It then describes classic phishing attack vectors such as social engineering techniques that exploit human curiosity, fear, and empathy. One such classic technique is distributing malware via email attachments or links that appear to be gifts or prizes but instead install Trojan horse programs on victims' computers. The document aims to educate about phishing risks and prevention.
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
The document summarizes the first LINE-Intertrust Security Summit held in Tokyo on May 17, 2017. The summit brought together business, research, and security product leaders to discuss challenges around internet security and potential solutions. It notes that the original design of the internet did not consider security, and that current efforts are focused on overlaying new security technologies to address ongoing threats and attacks against consumers and infrastructure. The goal of the conference was to present research on threats and solutions to help create a safer internet.
This document discusses security risks associated with wireless access and mobile devices. It provides 10 steps for improving mobile security, including enforcing policies, password protection, antivirus software, encryption of files, and device lockdown. It also discusses threats like rogue wireless access, denial of service attacks, and the risks of unencrypted laptop hard drives. It recommends using mobile VPNs with encryption, authentication, and data encapsulation to secure over-the-air transmissions. Companies can also use solutions that detect and block rogue access points and wireless clients to prevent unauthorized access to networks.
1. The document discusses security strategies for unified communications (UC) systems. It covers common threats like toll fraud, denial of service attacks, man-in-the-middle attacks, and social engineering.
2. The document provides a history of security issues with telephone networks and explains how UC systems are now more vulnerable since they operate over the internet.
3. It emphasizes the importance of security for UC given its importance for business communications and operations. Basic security practices like strong passwords, firewalls, VPNs, updating software, and disabling unused services are recommended.
The document discusses several trends in physical security systems moving from analog to IP-based networks:
1) More surveillance cameras, access controls, and sensors are connecting to IP networks which allows for features like priority tagging, automatic device discovery, and network access control.
2) HD video and video analytics software are improving surveillance capabilities like facial recognition while reducing bandwidth needs.
3) Building access controls are integrating with IP networks to automate policies and incident response.
4) Open standards are promoting interoperability between physical security systems and other communication technologies.
Making home security simple and accessible by connecting people and their homes.
We believe in great design and effortless experience
Launching complete smart home security delivered from a single device with no installation.
NVIS is developing an encrypted overlay network that provides secure connectivity without restrictions. It uses existing public internet infrastructure but is hidden and unhackable. The software allows users to dynamically choose who is in their network groups. This creates instant secure networks with low costs. NVIS aims to address big problems like frequent hacker attacks and privacy issues that plague the current internet, by building security and privacy into a new type of network.
This document is the fourth quarter 2009 issue of the e-Security newsletter published by CyberSecurity Malaysia. It contains summaries of several articles related to cybersecurity topics such as cryptography, social engineering techniques, malware, and cyber defense. The issue also includes a message from the head of CyberSecurity Malaysia highlighting security events held in the last quarter and emphasizing the importance of cybersecurity awareness. It concludes by inviting readers to contribute articles to future issues and provides contact information for CyberSecurity Malaysia.
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
This document summarizes a presentation given by Koichi Moriyama of NTT DOCOMO on their deployment of FIDO authentication. It discusses how NTT DOCOMO implemented FIDO standards to enable passwordless login for their d ACCOUNT system using biometric authentication on supported devices. It provides details on the motivation, user experience, and security approach taken. It also discusses future goals of using mobile devices as the primary authentication method and creating a world without passwords.
This document provides a summary of Denyse L. Cowan's contact information, career history, and technical skills. It summarizes her experience as an IT Security Analyst and Security Awareness Specialist, including roles at SOCAN, CGI, and Royal & Sun Alliance. Her technical skills include firewalls, antivirus software, vulnerability scanning tools, and network administration. She is studying for the CISSP certification exam in July.
This document announces the 3rd Annual Chief Information Security Officer Middle East Summit & Roundtable to be held January 31-February 2, 2011 in Dubai, UAE. The event brings together CISOs and IT security professionals from business and government to share best practices for addressing rapidly changing security challenges in the Middle East region. The agenda includes keynote speeches and panels on topics such as securing mobility solutions, data breaches, identity management, cloud security, and emerging cyber threats. Attendees will have opportunities to network and benchmark security strategies with international peers.
Application security as crucial to the modern distributed trust modelLINE Corporation
The document discusses the need for application layer security given three modern trends: scale, hyperconnectivity, and the merger of cyber and physical worlds. It notes that by 2020 there will be billions of connected people and devices generating huge amounts of data. Application security is crucial because isolation defeats connectivity, and ransomware and other malware pose risks. The document argues that software self-defense through mechanisms within devices and applications can help address these issues, providing security that is simple, self-maintaining, and inexpensive.
MarkAny is a Korean company that develops digital rights management and security technologies to protect corporate intellectual property, with over $8 million in annual sales and a focus on document watermarking, encryption, and access controls. Their Document Safer solution manages the distribution and use of protected documents through encryption, access controls, and auditing to prevent unauthorized copying, distribution, or access to sensitive business information. Major clients of MarkAny include Samsung Electronics, LG Electronics, and other large Korean corporations.
1) The document discusses the history and future of cryptography, including the transition from symmetric to public key cryptography and challenges with the blackbox security model.
2) It introduces the concept of whitebox cryptography as a way to obscure cryptographic keys and algorithms when they are used in unprotected environments.
3) The future of cryptography depends on finding practical solutions to theoretical problems like obfuscation and addressing attacks on both software and hardware implementations.
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.
In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
European Cyber Security Perspectives 2016Omer Coskun
This document summarizes a case of phishing attacks carried out by an organized criminal group targeting email accounts and using KPN's infrastructure to send large volumes of phishing emails. KPN-CERT and the KPN Abusedesk tracked the activities of the group over a long period. The group registered fake domains and sent phishing emails from static IP addresses. When an IP address was blocked, the group would find nearby open wireless networks through "wardriving" and use those new IP addresses to continue their attacks. The persistence and organization of the group posed a serious threat, but they made mistakes that allowed KPN to track their activities and build a case for potential prosecution.
Managed Security Service Providers like Netmagic can improve your security posture by monitoring services with advanced tools and expertise. Enjoy increased availability and reliability of networks; avoid the risk security breaches with Netmagic.
Not so long ago, the only way to access a new application was to install it from a floppy disk.
Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office,
at home, in cafés, on the street, even on the beach. We live in a world where we are connected
all the time. This influences our lifestyle, our interests and attitude, it changes the way we work.
This means a whole new era for the software industry. And this era should be called “Cloud”.
802 Secure develops software defined radio and big data analytics to secure wireless networks and the Internet of Things. The company's technology detects and prevents exploitation of advanced wireless threats using deceptive networking techniques. 802 Secure's products include a real-time wireless security system to protect first responder communications and a Wireless Risk Audit Tool to identify vulnerabilities across multiple wireless spectrums before incidents occur. The company aims to secure the growing number of wireless devices as the Internet of Things market expands dramatically.
The document provides information about the SUMMIT 2016 Mobile Retailing Conference, Mobile Banking Conference, and Mobile Security Conference taking place on May 11-12, 2016 at the Indaba Hotel in Fourways, Johannesburg. The conferences will address topics related to securing mobile experiences, mobile security threats, establishing solutions to counter mobile threats, and fostering strong organizational mobile security practices. Speakers will include experts from Microsoft, IBM, SensePost, and other organizations.
The document discusses InterVision, an IT solutions provider that has been in business for 23 years. It highlights endorsements from industry leaders praising InterVision's infrastructure solutions and services. It also provides an overview of InterVision's professional services engagements, certifications, partners, locations, and executive team members. The document outlines InterVision's focus areas over time, including cloud, converged infrastructure, and security solutions. It describes InterVision's enterprise class services.
The document discusses InterVision, an IT solutions provider that has been in business for 23 years. It highlights endorsements from industry leaders praising InterVision's infrastructure solutions and services. It provides an overview of InterVision's professional services engagements, certifications, partners, and offices. It also introduces the executive team and lists some of InterVision's awards and accolades. Finally, it outlines InterVision's focus areas over time and its enterprise-class services.
The 99.999 percent cybersecurity problemSherry Jones
The document discusses how the telephone industry achieved 99.999% reliability ("five nines") and argues that cybersecurity should strive for the same standard of near-perfect reliability. It describes how early telephone networks faced challenges with coordination, monitoring, and service quality due to their decentralized nature, similar to early cybersecurity relying primarily on firewalls. The telephone industry was able to standardize and consolidate, allowing for investments in research, new technologies, and system-wide improvements that delivered highly reliable service. The author argues cybersecurity needs to similarly think on a large, global scale through collaboration and innovation to solve systemic problems and protect data with nearly perfect reliability as more devices connect.
This document provides information about the InfoSec World 2017 Conference & Expo taking place April 3-5, 2017 in Orlando, Florida. The conference will feature over 70 sessions across 7 tracks, 10 workshops, and keynote speakers discussing topics such as DevSecOps, cloud security, risk management, and more. Pre-conference and post-conference workshops will be offered on topics including mainframe security, red team/blue team techniques, incident response, and malware analysis.
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
This edition features The Most Impressive Leaders in Cybersecurity, Making Waves in the Industry that are at the forefront of leading us into a digital future
Read More: https://ciolook.com/most-impressive-leaders-in-cybersecurity-making-waves-in-the-industry-2023-august2023/
Barack Obama hosted the first Nuclear Security Summit in 2010 to address nuclear terrorism. The 2014 summit in The Hague brought together 58 world leaders to discuss progress and remaining goals. Cisco helped design and implement a secure wired and wireless network for the event to support over 1500 delegates on portable devices without any security breaches or downtime. The network performed well under pressure as concerns were raised on social media during the summit.
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
The document discusses the convergence of physical and cyber security and how companies need to bridge the gap between IT and security teams. It talks about how physical security technologies like CCTV and access control have migrated to networked systems, bringing benefits like standardization and interoperability but also new cybersecurity challenges. The document advocates for organizations to work with security experts to conduct risk assessments and deploy risk mitigation strategies to reduce attack surfaces and vulnerabilities on networked physical security systems.
The Most Influential CISOs Of The Year 2024.pdfTHECIOWORLD
This document profiles Dr. Harrison Nnaji, the Group Chief Information Security Officer at FirstBank Nigeria Ltd. It discusses his career path from engineering to cybersecurity leadership roles, highlighting his accomplishments and expertise. It summarizes an interview where he discusses transforming organizations through strategic vision, understanding business needs, and continuously navigating cyber risks. He emphasizes the importance of planning, training, technology, and adapting to changing threats to effectively balance business operations and security.
How A-Core Concrete Sets a Solid Foundation for Preemptive SecurityDana Gardner
Transcript of a discussion on how to best balance resilient security requirements with efficient use of human capital and resources in a highly dispersed organization.
The New frontiers in Information SecurityVineet Sood
With New Dimensions getting Introduced @ Work every year this Presentation to Top CIO's in India showcases changing trends in Information Security
Trend 1 – Keeping the Bad Guys Out
Trend 2 – Letting the Good Guys In
Trend 3 – Keeping Good things In
This document summarizes a payment card industry security and compliance round table discussion. It includes an agenda covering topics like EMV chip technologies, mobile payments, data transmission encryption, point-to-point encryption, PCI compliance in the cloud, designated entities, and two-factor authentication. Short biographies are provided for the panelists - Dr. Phillip Hallam-Baker, Trevor Horwitz, and Richard Emrich. The document concludes by advertising the webinar sponsor and providing contact information for the InfraGard Atlanta organization.
This document discusses the concept of a Zero Trust network architecture. It proposes building networks from the inside out by focusing first on protecting important data and systems, and then designing the network infrastructure around them. This approach treats all network traffic as untrusted and aims to eliminate the traditional distinction between trusted internal and untrusted external networks. The goal is to design more secure, efficient, and cost-effective networks better suited for today's threats and compliance needs.
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
Steve Roderick, CEO of gotoBilling, differentiates his end-to-end software payment service in a highly competitive marketplace. How? He trusts a formula that’s a critical component of every business. Sound security — particularly when properly layered — helps organizations defend against breach, protect their brands, ensure compliance and avoid fines. And it’s a message that’s resonating with customers and winning business.
This document discusses cybersecurity and Zyrm Cybersecurity services. It begins with an introduction to cybersecurity threats facing organizations and provides statistics on the growth of the cybersecurity market. It then outlines Zyrm's cybersecurity services such as DNS services, email fraud protection, and penetration testing. Case studies and client testimonials demonstrate how Zyrm has helped clients. The document concludes by providing contact information for Zyrm.
PRO provides a fully integrated managed service provider (MSP) and vendor management system (VMS) solution to help enterprises build well-managed contingent labor programs. It pioneered contingent workforce management in 1991 and has maintained leadership through its experienced staff and vendor-neutral approach. PRO helps companies secure the best talent at minimal cost while managing risk and ensuring compliance.
This document is the April 2013 issue of the CIO Digest magazine published by Symantec. It includes articles on topics related to information technology such as data protection appliances, big data strategies, and business continuity in the wake of a natural disaster. The cover story discusses how CSX Transportation protects its information across trains, data centers, and endpoints. Other articles profile IT strategies for organizations such as a Spanish government agency and the city of Lansing, Michigan. The issue also includes columns on trends in IT security, reviews of business books, and an introduction to Symantec's new strategy and leadership under its new CEO.
LivePerson offers pay-for-performance managed chat services where fees are based on achieving agreed-upon performance goals. Their experienced chat operations managers help optimize chat programs to improve outcomes like cost per interaction, customer satisfaction, and scaling chat services. They work as an operational partner to deploy technology and processes to meet key performance indicators within 60 days and typically scale an optimal environment within 6-9 months, resulting in at least a 10% reduction in cost per interaction.
This document discusses different solutions for managing contingent workforces: Managed Service Providers (MSPs), Vendor Management Systems (VMSs), and Freelancer Management Systems (FMSs). MSPs and VMSs have been used historically to source, onboard, manage, and pay contingent workers through staffing agencies. FMSs are newer solutions that match companies directly with independent freelance workers for specific projects. While FMSs aim to address some contingent workforce needs, they do not provide the full suite of services that integrated MSP/VMS solutions offer in comprehensively managing an enterprise's total contingent labor spend and supplier relationships. The complexity of contingent workforce management is increasing as these workforces grow in size
Making the Journey to Customer Marketing 3_BIOPatrick Spencer
Customer Marketing has evolved through three eras:
1.0 (1990s-2002) was tactical with a focus on order taking. References were managed through spreadsheets.
2.0 (2004-2011) saw automation of reference management and consolidation of Customer Marketing teams. Professionalization also began.
3.0 (2012-present) is driven by changes to the buyer journey where buyers research more online. Tighter integration exists between Customer Marketing and other marketing functions like content marketing and social media. Implications include content playing a key role in purchasing decisions and Customer Marketing taking on more strategic importance within organizations.
The document provides a checklist for disaster preparedness based on lessons learned from SMBs that lacked adequate plans. It discusses a 2011 survey finding that half of SMBs do not have an IT disaster plan. Case studies of SMBs that experienced disasters show the high costs incurred without a plan and how those with plans, like using Symantec backup and recovery solutions, were able to recover rapidly. The checklist recommends doing an assessment of needs, creating a plan, implementing solutions, testing the plan, and maintaining preparedness.
The document discusses how IT has enabled the growth and expansion of Iceberg Drive Inn, a burger and milkshake restaurant chain. It describes how the company implemented a Microsoft Small Business Server and Symantec software for security, backup, and data protection. This helped improve productivity, resolve email blacklisting issues, and protect their data. The IT solutions have helped the company franchise to 14 locations across multiple states while managing communications and information with a small corporate team.
Making the Journey to Customer Marketing 3_BIOPatrick Spencer
The document discusses the evolution of customer marketing over three eras:
1) Customer Marketing 1.0 (1990s-2002) was a tactical, non-strategic role focused on order taking to support sales, PR, and AR. References were tracked via spreadsheets with no centralized system. Success was measured by lack of complaints.
2) Customer Marketing 2.0 (2004-2011) saw automation of reference management through web-based systems. Third party software-as-a-service providers emerged to replace in-house solutions. Larger organizations consolidated fragmented customer marketing teams.
3) Customer Marketing 3.0 (2012-present) is described as more strategic and data-driven. Advanced
Community Healthcare System transformed its IT infrastructure by standardizing systems, implementing shared services, and adopting cloud technologies. This replaced the old, fragmented infrastructure with a modern, efficient environment that improved operations and reduced costs.
1) The security landscape has changed dramatically in recent years as threats grow at alarming rates and existing security solutions become quickly outdated.
2) The article investigates the changes in security and compliance driven by increased regulatory requirements, the need to align security strategies with business needs, a growing focus on information over infrastructure, and new threats like social media and cloud computing.
3) Interviews with security leaders from three organizations reveal how they are addressing these changes through initiatives like deploying Symantec solutions for centralized security and compliance management and adhering to standards like ISO 27001.
1. SMB
ConfidentThe
CoverStory
IT that Speaks the Same Language
Roaming in the
Stars
< 11 >
ByPatrickE.Spencer
Starhome
In the late 1990s and early part of the 2000s when I was working on
my dissertation at the University of Durham, I would fly over to the
United Kingdom from my home in Northern California and spend a
week meeting with my advisor and compiling additional research
each year. During one of my initial trips my wife returned to Taiwan
to visit her parents. As I did not own a mobile phone at the time and was
staying at an inexpensive inn without a phone, the only means for me
to communicate the date of my planned return to my wife was with a
handful of sterling in a classic red telephone booth on the corner of the
town square in Durham.
Fast forward less than 10 years. It is almost unfathomable to travel
internationally—let alone regionally—without mobile phone ser-
vice and, for many of us, email and Internet services. Tele-
phone booths are an extremely rare sighting, and even
then most have been simply retained as a tourist
attraction or historical artifact.
I
RICHARDBORGE
Contents
CoverStoryCaseStudy
ç
CloudFeatureSecurityandDataProtection
ç
2. SMB
ConfidentThe
CoverStoryCaseStudy
ç
SecurityandDataProtection
Contents
TwoIsBetterThanOne
< 12 >
CoverStory
Starhome
Mobile devices were a key enabler
of this rapid transformation. And the
underlying telecommunications infra-
structure was just as critical. But none
of this would have been possible without
the ability to roam outside of your home
network—regionallyandinternationally—
and know that your mobile services
would remain uninterrupted.
The behind-the-scenes enablement
of roaming services and billing is taken
for granted by many today, even though
the technologies are often pioneering
and quite sophisticated. And with
178 operators—and counting—in 118
countries in its connected network,
30-plus solutions, and 900 live ser-
vices, Starhome is a leading player in
the roaming mobile services market.
Run Fast: Yaniv Dinar
W
en Yaniv Dinar joined Starhome in 2000 as a security
analyst, the company had approximately 10 mobile
operators in its network and a handful of solutions.
“Security has evolved as much as the company has during this
timeframe,” Dinar notes. “I was convinced 10 years ago that a
security firewall was the first line of defense against malware,
viruses, and intruders. Security has transformed into something
much broader and encompassing in scope in the past few years.”
Y2K was the “rage” of IT when Dinar joined Starhome. “IT staff
were worried about keeping their jobs,” he says. “I was unmarried
at the time, and I decided to run fast and to work on innovative
projects. I was promoted to team leader of the Security and
Networking team after two years.” He also had a very supportive
management team that empowered him to make decisions and
execute on them. He initially studied pre-engineering in school and
then went on to complete his undergraduate degree in executive
business management from Ruppin Academic Career Center. “This
provided me with a broad background that has helped me bridge the
gap between the engineering team and IT,” he explains.
In 2007, Dinar
was promoted
again to IT and
infrastructure
manager and given
the charge to lead
a combined IT and
engineering group
reporting to the
vice president of
Customer Service and Support. During this time frame, he led efforts
to integrate virtualization, next-generation storage, and various other
technology solutions. When asked to comment on the reasons for his
success, he cites two intertwined factors. “Early on, I had a chance
to be quite innovative and to run fast; not being afraid to use new
technologies and try new things is important,” he explains. “It is also
important to accept responsibility for your mistakes and to learn from
them. This is something I learned from my manager, who has been a
great mentor.”
Yaniv Dinar, IT and Infrastructure Manager, Starhome
MICHAELBRUNETTO
3. SMB
ConfidentThe
Contents
CoverStoryCaseStudy
ç
CloudFeatureSecurityandDataProtection
ç
< 13 >
CoverStory
Starhome
Speak the same language
Technology is a central
lynchpin for a company
like Starhome. A midsize business
with approximately 200 employees,
Starhome holds 16 patents. Until
about two years ago, Starhome’s in-
ternal IT operations were outsourced
to its parent company, Converse
Technology, Inc. Seeking to lower
costs and, more importantly, to lever-
age cross-development opportunities
between IT and engineering initia-
tives, Starhome and Converse Tech-
nology made a decision to bring IT
operations in-house. Overseeing this
entire process was IT and Infrastruc-
ture Manager Yaniv Dinar, who joined
the company in 2000 and served as
infrastructure manager previous to
this appointment, and his
team of six IT and engi-
neering professionals.
Much of the technology infrastruc-
ture was simply transferred from
Converse Technology to Starhome,
including a set of security solutions
based on a number of different point-
product solutions. Endpoint security
was based on Symantec AntiVirus
for clients and Trend Micro Endpoint
Security for data center servers,
messaging security on Pinapp Mail-
Secure, and Web gateway security
on Aladdin Secure Web Gateway.
“Having three separate security solu-
tions for endpoints, messaging, and
the Web gateway was like learning
and maintaining three different lan-
guages,” Dinar says. “We wanted the
three solutions to talk to each other
by speaking the same language.”
Wanting to drive IT operational effi-
ciencies while improving the company’s
overall IT risk posture, Dinar consulted
with Symantec Partner Spider Solutions
Ltd. about potential solutions. “We ini-
tially looked to Symantec for just end-
point security,” he recalls. “We decided
to upgrade and migrate to Symantec
Endpoint Protection from Symantec An-
tiVirus and Trend Micro Endpoint Secu-
rity about 18 months ago.”
However, the need for interoperability
between each of the different security
components remained in the background
of Dinar’s discussions with Spider
Solutions. “Starhome kept pressing the
issue that they wanted a solution that
not only included endpoint security but
Web gateway and messaging security,”
says Diego Schaiquevich, vice president
of sales and marketing at Spider Solu-
tions. “Symantec had recently acquired
the Symantec Web Gateway technology,
and we asked for a two-month proof of
concept. We will not go to a client with a
new solution unless we’re confident it will
“Havingthreeseparatesecuritysolutionsforendpoints,
messaging, and the Web gateway was like learning
and maintaining three different languages.”
– Yaniv Dinar, IT and Infrastructure Manager, Starhome
Yaniv Dinar discusses the
intersections between IT and
engineering at Starhome.
Podcast
4. SMB
ConfidentThe
Contents
CoverStoryCaseStudy
ç
CloudFeatureSecurityandDataProtection
ç
< 14 >
CoverStory
Starhome
meet their requirements and prove to be robust. We were
very satisfied with Symantec’s engineering support and the
product development roadmap we received.”
Dinar adds: “Spider Solutions worked with us to verify
that the technology met our requirement. It was an im-
portant decision; one that we wanted to ensure was the
correct choice.”
Putting together a suite
It was at this stage that Dinar began thinking about moving
to Symantec Protection Suite instead of purchasing each
solution area separately. Messaging security was some-
thing they also wanted to address. “The Gartner Magic
Quadrant ranks Symantec Brightmail Gateway in the upper
right-hand quadrant,” Dinar notes. “Contrary to what we
normally do with nearly every other technology solution, we
decided we didn’t need to push Brightmail Gateway through
any proof-of-concept testing. Its reputation precedes it, and
we were willing to go direct to production.”
In addition to the security components that comprise
Symantec Protection Suite, Dinar and his team have used
Symantec Backup Exec System Recovery since the begin-
ning of 2009, leveraging it for rapid recovery of clients and
data center servers.
With all of these issues as factors for consideration, Dinar
and his team chose to acquire Symantec Protection Suite at
the end of 2009 and commenced work with the consulting
team from Spider Solutions to design and implement—or
Don’t Leave Home Without Roaming
I
n wireless telecommunications, roaming refers to the capability
of mobile devices to remain connected to the network even
though the connectivity service is different than the home
network. In particular, mobile users are able to make and receive
calls and voice mails, send and receive data, and access other
services when traveling—or roaming—outside of their geographical
area. Roaming is technically supported by mobility management
services such as authentication, authorization, and billing.
There are many types of roaming, including: (1) regional, (2)
national, (3) international, (4) inter-standards (the ability to move
between mobile networks of different technologies), (5) mobile
signature (access point obtaining a mobile signature from any
end user), (6) inter MSC (network elements belonging to the same
operator but located in different areas), (7) permanent (contract
that assumes constant roaming), and (8) trombone (roaming
outside of a local tariff area).
Roaming activation typically maps to the following process: (1)
a differentiation between the home network and visited network
is registered, (2) the visited network requests authentication and
authorization from the home network, and (3) entry into the user
database of the visited network is granted and authorized network
services are enabled. Global Service Roaming Capability refers to
the ability of subscribers to use their personal service profile from
their home network.
Roaming agreements are negotiated between the home network,
visited network, and roaming provider such as Starhome. The
Global System for Mobile Communications Association (GSMA)
broadly outlines legal aspects involving issues such as billing,
authentication, and authorization for such roaming agreements.
5. SMB
ConfidentThe
Contents
CoverStoryCaseStudyCloudFeatureSecurityandDataProtection
ç
< 15 >
CoverStory
Starhome
the upgrade—each of the different
solution pieces. Throughout the
deployment of Symantec End-
point Protection, Symantec Web
Gateway, and Symantec Bright-
mail Gateway, Spider Solutions
provided a turnkey solution for
Starhome. “We are pleased with
the support we received from
from Spider Solutions,” Dinar
says. “They have a deep under-
standing of Symantec technology
solutions and have helped guide us
through a phased implementation.
In addition, their team has provided
excellent ongoing support after the
solutions were implemented.”
Security for the cloud
Security is critical for Starhome.
Its cloud-based offerings are
configured as a star topology
running from its Global Services
Operations Centers. “Our hosted
services provide interconnectivity
between each of our customers,”
Dinar says. “As a result, whenever
we attend a sales convention, we are
asked by potential customers if a
hacker or malicious code entering at
one point in the star topology could
access other points.” The architec-
ture of the solution is configured,
however, to prevent this from occur-
ring, Dinar emphasizes. “While the
services are located on the custom-
er’s premises, they reside logically in
our network.”
This is where Symantec End-
point Protection comes into play.
“We manage endpoint security
on our services that reside on the
physical premises of the customer
from our network,” Dinar says. He
and his team opted to deploy most
of the functionality in Symantec
Endpoint Protection, starting with
antivirus, antispyware, and intru-
sion prevention.
“Installing a personal firewall for
all of our clients was critical for us,”
he adds. “We needed to lock down
every endpoint, and ensure that
Yaniv Dinar (right), IT and Infrastructure Manager,
Starhome, and Diego Schaiquevich, VP of Sales,
Spider Solutions Ltd.
MICHAELBRUNETTO
6. SMB
ConfidentThe
< 16 >
Contents
CoverStoryCaseStudy
ç
CloudFeatureSecurityandDataProtection
ç
it was integrated within the larger end-
point security console. This integrated
endpoint security portfolio provides us
with operational efficiency gains, as well
as a more secure IT environment.” With
the previous endpoint security infra-
structure, users could securely access
the Internet through wireless connec-
tions; however, there was a potential
backdoor threat that Dinar sought to
correct. “Earlier, I couldn’t sleep at night
because I knew this threat existed,” he
says. With personal firewall in Endpoint
Protection, he is able to block backdoor
access and eliminated this threat.
Dinar and Starhome are quite pleased
with the results of the endpoint security
deployment. Daily status reports pro-
vide them with a consolidated view of all
threat vectors—both current and poten-
tial. The smaller footprint of Endpoint
Protection is also proving beneficial.
“The IT help desk received calls every
day from end users who complained
about the performance of their clients
during patch updates,” Dinar notes.
“When we uninstalled the prior solution
and rolled out Endpoint Protection, end
users were in shock.” Each employee
has gained another 15 or 20 minutes of
time per day because security updates
and scans run in the background and
don’t overwhelm system resources.
“We run very fast as an organiza-
tion,” he reports. “We did not want
to take any chances with endpoint
security, and this is why we selected
Symantec, a technology provider that we
can count on.”
Proactive security at the Web gateway
Dinar had aggressive requirements in
place when he selected Symantec Web
Gateway. “We wanted to implement
policies and rules and not simply filter
content,” he explains. “We stipulated
inbound and outbound security manage-
ment at the Web gateway.” One of the
outbound activities he sought to block
was gaming, which was impacting em-
ployee productivity, as well as presenting
a security risk. “FarmVille on Facebook,
a real-time online farm simulation game,
was one of the applications in ques-
tion,” he relates. “We also block access
to personal
email; the
possibility
Starhome: Shooting
for the Stars!
Founded: 1999
Employees: 200 plus
Headquarters: Zurich, Switzerland
Mobile Operators Served: 178 in 118
countries
Services: Roaming services for mobile
network operators
Business Units: (1) Retail—seamless
solutions to stimulate and increase
roaming traffic and usability; (2)
wholesale—powerful solutions to meet
wholesale targets and IOT discount
agreements; and (3) operation—
mission-critical solutions to optimize
network efficiency and reduce cost of
ownership
Company Facts: 16 registered patents,
a 95% customer renewal rate, and 25%
customer growth in 2009
Website: www.starhome.com
CoverStory
Starhome
Video
Starhome’s Yaniv
Dinar discusses
how he and his team are
leveraging Symantec
technologies.
s
7. SMB
ConfidentThe
< 17 >
Contents
CoverStoryCaseStudy
ç
CloudFeatureSecurityandDataProtection
ç
of malware or malicious code infiltrat-
ing into our environment through this
backdoor is something we wanted to
eliminate.”
One of the key pieces of function-
ality in Web Gateway that Starhome
is finding beneficial is the option for
users to request the unblocking of
a legitimate website that has been
blocked. In the past, users had to call
the IT help desk, a time-consuming
process that wasted valuable IT staff
time and prompted users to wait
between 10 minutes and sometimes a
full business day before getting ac-
cess. “Now, they simply click a button
that sends an alert to the IT team,
we check the website, and then re-
lease access if it is legitimate,” Dinar
explains. Previously, one full-time
employee from Dinar’s team spent
an average of 30 minutes each day
reviewing report logs; now it is one
minute each day. The benefits extend
beyond the productivity gains around
the task of reviewing reports and
granting access to legitimate web-
sites. In the case of the IT help desk,
“it is a matter of opening a ticket,
assigning it to a help desk representa-
tive, notifying the end user, and clos-
ing the ticket,” says Dinar. “This is a
substantial time saver.”
Two-way messaging security
The prior messaging security solu-
tion only provided Starhome with
inbound security. Because of the need
to protect the company’s Internet
Protocol (IP) reputation, and thus
prevent emails from being blocked by
recipients as potential spam, Dinar
and Schaiquevich determined they
needed a solution with both inbound
and outbound filtering—and Symantec
Brightmail Gateway 8300 provided
both. In addition, seeking ease of
deployment and use, Dinar opted for
an appliance rather than a software-
based solution.
“With our previous messaging
security solution, we had to retain
spam because of the false positives,”
Dinar says. “Spider Solutions told us
Brightmail Gateway does not have
issues with false positives, and thus
instructed us to delete all spam and
not to archive it. With some hesita-
tion, we went forward with their
“We were very satisfied with Symantec’s engineer-
ing support and the product development roadmap
we received [for Symantec Web Gateway].”
– Diego Schaiquevich, VP of Sales and Marketing, Spider Solutions Ltd.
Spider Solutions Ltd.
Founded: 2000
Services: (1) Expert consulting services;
(2) integration, management, and
execution of projects; and (3) service,
support, and maintenance
Symantec Partner: Since 2003
Investment: Partially owned (60%) by
EMET Computing
Website: www.spiderservices.com
CoverStory
Starhome
8. SMB
ConfidentThe
< 18 >
recommendation and have found
they were right. We have not had one
false positive.”
Protecting data—efficiently and with
confidence
At the beginning of 2009, Dinar made a
decision to upgrade the storage environ-
ment by moving to a next-generation data
protection solution from Symantec.
He and his team deployed Syman-
tec Backup Exec System Recovery
for backing up images on clients
and data center servers that can be
recovered in a matter of minutes. For
backup and recovery for data center
servers, they rolled out Symantec
Backup Exec, which integrates with
their existing NetApp storage sys-
tems and virtualized server environ-
ment using VMware. With the migra-
tion to Backup Exec, Dinar and his
team were able to move from tape- to
disk-based backups, performing incre-
mental backups every night and a full
backup on the weekend.
The results over the prior backup-
and-recovery environment have been
significant in the data center environ-
ment alone, which includes nearly 50
virtualized servers and approximately 10
terabytes of data. “We have a more than
95 percent backup success ratio, and we
have been able to maintain a 12-hour
weekly backup window despite a 15
percent annual backup volume growth
rate,” Dinar says. Of course, archived
data is only as good as recovery capa-
bilities, and Dinar reports that in the
few instances he and his team have had
to perform recoveries, the process has
been seamless and fast.
In the case of backup and recovery
for the company’s approximately 200
clients, Dinar and his team are able to
perform recoveries for individual files
to full systems. Before the deployment
of Backup Exec System Recovery, they
had to perform a full system recovery,
an activity that required four hours or
more. Now it takes less than 45 min-
utes. In addition, beyond the inefficien-
cies, the team wasn’t able to perform
CoverStory
Starhome
“We manage endpoint security on our services
that reside on the physical premises of the
customer from our network.”
– Yaniv Dinar, IT and Infrastructure Manager, Starhome
MICHAELBRUNETTO
Contents
CoverStoryCaseStudyCloudFeatureSecurityandDataProtection
ç
9. recoveries from one hardware platform
to another. The integration points
between Backup Exec System Recovery
and the different security components
comprising Protection Suite are an
additional value for Dinar. “We’re able
to automatically back up client and
server images when the security threat
increases,” he says. “Having a suite of
products that talk the same language
is a big plus, particularly for a small IT
team like ours.”
In August 2010, Dinar and his team
upgraded both solutions to Symantec
Backup Exec 2010 and Backup Exec
System Recovery 2010. The additional
virtualization support provides en-
hanced functionality and integration,
and the Starhome team can now seam-
lessly upgrade to Microsoft Exchange
2010, as they plan to do so later in the
year. “Backup Exec 2010 is more robust
and performs faster backups than the
prior versions,” Dinar says. The uni-
fied archiving capabilities in Backup
Exec 2010 are also something Dinar
anticipates leveraging. “We plan to use
Backup Exec Archive Option to move
all of our data archiving to our NetApp
file systems,” Dinar adds. “The abil-
ity to leverage this more affordable
storage while defining retention poli-
cies is something we believe will deliver
substantial value for us.”
It’s in the stars…
This summer my wife, daughter, and I
went on vacation in the United Kingdom,
and our visit included a trip to Durham
for a meeting with my former advisor
who retired in August. Curiously, as
we were walking past the town square
on the way to meet him, I noticed the
classic red telephone box was gone.
Relegated to the scrap heap of technol-
ogy that is as foreign to my 11-year-old
daughter as the telegraph is to me, the
red telephone box lives on in the stars—
and in the case of Starhome, is roaming
in the stars. n
Patrick E. Spencer (Ph.D.) is the editor in chief and
publisher for CIO Digest and The Confident SMB and the
author of a book and various articles and reviews published
by Continuum Books and Sage Publications, among others.
< 19 >
CoverStory
Starhome
n Symantec Protection Suite Advanced Edition
u Symantec Endpoint Protection
u Symantec Backup Exec System Recovery
u Symantec Web Gateway
u Symantec Brightmail Gateway
n Symantec Backup Exec 2010
n Symantec Partner Spider Solutions Ltd.
Symantec Constellation in the Stars
Contents
CoverStoryCaseStudyCloudFeatureSecurityandDataProtection
ç