Feeds

'Overplayed' privacy concerns rile Symantec boss

'IP addresses are so not private'

3 Big data security analytics techniques

Follow the money

The Symantec boss made these comments during an interview at the Symantec Vision and ManageFusion EMEA conference in The Hague on Tuesday. Questions by journalists following Thompson's keynote presentation focused on the crisis in the financial markets and the impact it might have on IT spending in areas such as security that Symantec competes in.

"No company is immune if customers have tough times. But security technology is not something that you can just defer. Even in tough times firms don't stop caring about resiliency and recovery. They don't stop caring about about confidential data within their corporate networks."

"The depth and breath of our portfolio allows us to weather the economic storm as well as anyone if not better than most," Thompson argued, adding that regulatory pressure would deter organisations in financial service or health care from taking shortcuts on security spending. "These are highly regulated industries. They may delay new projects but they won't ignore their responsibility to manage sensitive information."

Changes in cybercrime also came up during the session. Malware-based information security threats have changed so that 70 per cent of malware samples are primarily designed to steal confidential and sensitive information. In 2003, Symantec wrote signatures for five different malware samples a day compared to the 10,000 a day it now processes.

"The security model has changed. We are moving towards that is risk based and information-centric instead of looking at device and networks. That makes data classification [assigning more importance to company financial reports than routine office memos, for example] much more critical," he added.

Largely in response to the sheer volume of malware currently been released, many of Symantec's competitors have talked up the benefits of a cloud-based computing approach. Trend Micro, McAfee, and Panda Security have all announced moves in this direction over recent months. Symantec is taking a more conservative approach, positioning security as a service as primarily of interest to smaller businesses or as an option for larger businesses. Other in the anti-virus industry, by contrast, talk about cloud computing as a historic shift in architecture.

Symantec does plan to roll out an online disaster recovery and backup service, currently available only in the US, worldwide by March 2009.

Thompson went on to downplay the significance of mobile malware, at least for the short term, in marked contrast to some of Symantec's competitors including McAfee and F-secure. "Mobile malware is still something that looms in the future rather than a problem now," he said. ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.