Remove Security Remove Software Remove Symantec
article thumbnail

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here). The reality is that antivirus software that uses old fashioned methods of signature analysi. To read more please log in.

Symantec 382
article thumbnail

Big Data News: Symantec Picks Splunk for Enterprise Security Tool

Data Center Knowledge

Looker Datafold Engine empowers analysts with more meaningful insights through its in-database architecture, Symantec uses Splunk software to boost its security intelligence operations, and CommVault''s Simpana 10 software has achieved certified integration with the SAP HANA platform.

Symantec 187
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Webroot vs. Symantec: Endpoint security software comparison

Tech Republic Security

Symantec Endpoint Protection and Webroot Internet Security Plus 2022 are compelling security products intended to protect business systems. Learn the pros and cons of each security solution to make the best possible choice.

Symantec 126
article thumbnail

Broadcom Software's Symantec Threat Hunter Team discovers first-of-its-kind ransomware

Tech Republic Security

Nonetheless, Symantec said, it's dangerous. The new ransomware family, called Yanluowang, appears to still be under development and lacks some sophisticated features found in similar code.

Symantec 200
article thumbnail

We Are Living In The Age of the Mega-Breach

CTOvision

Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses. Symantec is known for their Global Intelligence Network , a monitoring capability made up of more than 41 million attack sensors. By Katie Kennedy. The Key Findings of the 2014 Report: .

Symantec 286
article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

The fact that more key sensors in ICS systems are found to be vulnerable is evidence of the inherent weaknesses in these systems and the need to secure them. Via Net Security, more here. ” Symantec believes that they have found at least 1200 malicious apps in the last seven months. Via ComputerWorld, more here.

Symantec 226
article thumbnail

Symantec and Kaspersky Labs Banned from China as Government Obliged to Choose Domestic Security Software

Data Center Knowledge

Government procurement agency excludes two firms from security software supplier list.

Symantec 186