SlideShare a Scribd company logo
1 of 8
Internship Overview
Ray (Raj) Kansagra
Intern, Master ’s Level ,Norton Engineering
“Norton Wi-Fi Security”
Statistics for Norton Wi-Fi Security
• Limited to 10,000 downloads for
Beta Version
• Reached our target in 8 days
• Overall rating 4.16 stars
3
Copyright © 2014 Symantec Corporation
The reasonable man adapts himself to the
world; the unreasonable one persists in
trying to adapt the world to himself.
Therefore all progress depends on the
unreasonable man.
Reputation Based call blocking
https://symantec.app.box.com/files/0/f/3908043891/1/f_32460347977
George Bernard Shaw
Irish Playwright
4
Copyright © 2014 Symantec Corporation
Back to Norton Mobile Security
• Componentization (Max Loves this )
-Refactored Design to modularize components
-Implementation of Componentization for App Advisor
5
Copyright © 2014 Symantec Corporation
“App Advisor UX refresh”
6Copyright © 2014 Symantec Corporation
Q&A
7Copyright © 2014 Symantec Corporation
Thank you!
SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2014 Symantec Corporation. All rights reserved.
Raj Kansagra
raj_kansagra@symantec.com
8

More Related Content

What's hot

Conducting site surveys for wlan performance and reliability
Conducting site surveys for wlan performance and reliabilityConducting site surveys for wlan performance and reliability
Conducting site surveys for wlan performance and reliability
Ken Scott
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
Abhishek Singh
 
Du new latest (IT)
Du new latest (IT)Du new latest (IT)
Du new latest (IT)
Jibran Zeb
 
Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application Frewall
Abhishek Singh
 

What's hot (20)

Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
AppSec is Eating Security
AppSec is Eating SecurityAppSec is Eating Security
AppSec is Eating Security
 
Conducting site surveys for wlan performance and reliability
Conducting site surveys for wlan performance and reliabilityConducting site surveys for wlan performance and reliability
Conducting site surveys for wlan performance and reliability
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
 
Today's Predictions for Tomorrow's Connected World
 Today's Predictions for Tomorrow's Connected World  Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World
 
Palo Alto Networks Sponsor Session
Palo Alto Networks Sponsor SessionPalo Alto Networks Sponsor Session
Palo Alto Networks Sponsor Session
 
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan LacksThe Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
 
Du new latest (IT)
Du new latest (IT)Du new latest (IT)
Du new latest (IT)
 
Building Security Controls around Attack Models
Building Security Controls around Attack ModelsBuilding Security Controls around Attack Models
Building Security Controls around Attack Models
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application Frewall
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 
Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option
 
Elastix securing, preventing, monitoring
Elastix securing, preventing, monitoringElastix securing, preventing, monitoring
Elastix securing, preventing, monitoring
 

Similar to Internship Overview

Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015
Zhankhana Pandya
 
SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery
Genuitec, LLC
 
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMwareInfrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
OpenStack
 
BHIMU RESUME_Network Admin
BHIMU RESUME_Network AdminBHIMU RESUME_Network Admin
BHIMU RESUME_Network Admin
Bhimu Uthnal
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTAC
JITHIN JOY
 
Anjali_lahariy2 yearnExperience.docx ()
Anjali_lahariy2 yearnExperience.docx ()Anjali_lahariy2 yearnExperience.docx ()
Anjali_lahariy2 yearnExperience.docx ()
Anjali Lahariya
 

Similar to Internship Overview (20)

Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015
 
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_shareNsc42 security knights slayer of dragons 0-5_very_short_15m_share
Nsc42 security knights slayer of dragons 0-5_very_short_15m_share
 
How to Build a Basic Edge Cloud
How to Build a Basic Edge CloudHow to Build a Basic Edge Cloud
How to Build a Basic Edge Cloud
 
SecurActive - Technical Workshop - Network Analyser & Application Performance...
SecurActive - Technical Workshop - Network Analyser & Application Performance...SecurActive - Technical Workshop - Network Analyser & Application Performance...
SecurActive - Technical Workshop - Network Analyser & Application Performance...
 
SolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New FeaturesSolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New Features
 
Deliver Flawless Mobile Apps Faster with CI/CD & CT
Deliver Flawless Mobile Apps Faster with CI/CD & CTDeliver Flawless Mobile Apps Faster with CI/CD & CT
Deliver Flawless Mobile Apps Faster with CI/CD & CT
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
InterVision
InterVisionInterVision
InterVision
 
SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMwareInfrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
Infrastructure as Code 101: Steve Tegeler + Nathan Ness, VMware
 
Resume - Varsharani
Resume - VarsharaniResume - Varsharani
Resume - Varsharani
 
BHIMU RESUME_Network Admin
BHIMU RESUME_Network AdminBHIMU RESUME_Network Admin
BHIMU RESUME_Network Admin
 
Imaginea qa&automation
Imaginea qa&automationImaginea qa&automation
Imaginea qa&automation
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTAC
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Anjali_lahariy2 yearnExperience.docx ()
Anjali_lahariy2 yearnExperience.docx ()Anjali_lahariy2 yearnExperience.docx ()
Anjali_lahariy2 yearnExperience.docx ()
 

Internship Overview

  • 1. Internship Overview Ray (Raj) Kansagra Intern, Master ’s Level ,Norton Engineering
  • 3. Statistics for Norton Wi-Fi Security • Limited to 10,000 downloads for Beta Version • Reached our target in 8 days • Overall rating 4.16 stars 3 Copyright © 2014 Symantec Corporation
  • 4. The reasonable man adapts himself to the world; the unreasonable one persists in trying to adapt the world to himself. Therefore all progress depends on the unreasonable man. Reputation Based call blocking https://symantec.app.box.com/files/0/f/3908043891/1/f_32460347977 George Bernard Shaw Irish Playwright 4 Copyright © 2014 Symantec Corporation
  • 5. Back to Norton Mobile Security • Componentization (Max Loves this ) -Refactored Design to modularize components -Implementation of Componentization for App Advisor 5 Copyright © 2014 Symantec Corporation
  • 6. “App Advisor UX refresh” 6Copyright © 2014 Symantec Corporation
  • 7. Q&A 7Copyright © 2014 Symantec Corporation
  • 8. Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2014 Symantec Corporation. All rights reserved. Raj Kansagra raj_kansagra@symantec.com 8