
続きを読む
Announced at the Clinton Global Intitative 2015, Symantec and NPower's cybersecurity workforce development pilot program (Symantec Cyber Career Connection NYC) will be scaled up to serve U.S. military veterans in Dallas, Texas in addition to serving young adults in New York City. NPower has administered tech training programs for veterans since 2013, and is experienced at customizing its training programs and support systems to effectively serve this population.
The original pilot achieved strong results; all students obtained Network+ certifications, while 80% obtained Security+. Students completed internships at industry-leading companies such as Bank of America, CBS, Marathon Consulting, Morgan Stanley, and New York Times. To date, five program graduates have secured full-time employment, while five have had their internships extended and are close to converting to full-time roles.
We are pleased to announce that the alpha program for Veritas Velocity™, is open for registration. The alpha program enables all organizations to test, validate, and provide feedback on a brand new offering coming to market later this year. This is an exciting time to be part of and shape the future of Copy Data Management.
Register Today!
If you are interested in participating in this upcoming Alpha program, please click on the registration link below and complete a short survey to successfully register.
Registration link: https://symbeta.symantec.com/callout/?callid=%7bD8939026-A333-406C-8AF4-6E42824F87B7%7d
If you have questions about this alpha program, please email: Sagar Kamat <Sagar_Kamat@symantec.com>.
We look forward to your participation in this very exciting alpha release!
Best regards, Veritas Velocity Team
This is a basic way to setup a monthly automation report for Patch management for new bulletins downloaded by the SMP.
1.) Create a new shared schedule relative to the MS patch Tuesday. (time zones will affect this, I'm in South Africa so my SMP server only downloads the Patch Tuesday results on Wednesday evening) (patch Tuesday is in Pacific standard time / GMT -8)
2.) Import the attached report - New Patches for the Month.XML in to the SMP server
3.) Import the attached email task - Send automation policy e-mail - Patch Management Alert.XML
4.) create a new Automation task
4.1) select the shared schedule created in step 1
4.2) data source: Report -> select report imported in step 2
4.3) conditions : run for non-empty data
4.4) select the job imported in step 3
4.5) edit input parameters:
a) refer to screen shot for details -> all custom data sources must be manually entered.
4.6) Test Automation policy to see if results are as desired.
Hi
im having problem with removing trojan.tash virus
iv updated my antivirus and still its not detactable
Welcome to the May edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.
It appears as though attackers had small businesses clearly in their sights last month. All of our metrics that look at the size of organizations show businesses with less than 250 employees were subjected to the largest amount of malicious activity during the month of May. For instance, 42.5 percent of spear-phishing attacks were directed at organizations of this size during May, up from 30.6 percent in April. Small organizations were the most targeted size for overall phishing too. And while all organization sizes hovered around a 52 percent spam rate, organizations with less than 250 employees had the highest rate at 52.7 percent.
Small organizations were most likely to be targeted by malicious email in the month of May as well, where one in 141 emails contained a threat. The overall proportion of email traffic containing malware also increased this month, up from one in 246 emails in April to one in 207 emails in May. However the percentage of email malware that contained a URL remained low in May, hovering around three percent. The Public Administration sector was the most targeted industry again in May, with one in 150 emails containing malware, though this is down from one in 127 in April.
In spear-phishing attacks, Microsoft Word files—the .doc and .docx extensions—made up over 40 percent of attachments used in spear-phishing attacks during May. Microsoft Excel files also ranked highly, comprising 13.5 percent of spear-phishing attachments. While executable files, such as .bin, .exe, and .scr files, are frequently seen in spear-phishing attacks, this category of file types was down almost 25 percentage points in May. The Manufacturing sector was subjected to the largest volume of spear-phishing attacks, as 41 percent were directed at organizations in this sector.
In other news, there were more than 44.5 million new malware variants created in May, one zero-day vulnerability was reported (CVE-2015-3456), and while two vulnerabilities in industrial control systems were reported in April, none were reported this May.
We hope you enjoy the May Symantec Intelligence Report. You can download your copy here.
Symantec’s Volunteer of the Quarter initiative highlights and rewards those employees who dedicate their time and talents to those in need. We have a long and proud history of encouraging our employees to volunteer. While the driving force of our efforts is largely altruistic, there is even more to volunteering than giving back to our communities. Volunteering makes our company a better place to work, so employees are helping both Symantec and the organizations they volunteer for.
This quarter we recognize Eileen Brewer, Senior Manager, Security Appliances Team, and her work to empower women and girls globally in science, technology, engineering and math (STEM). She is involved with three organizations that leverage technology and mentorship programs to encourage female empowerment and career development for women in Africa, Central Asia, and the Middle East: the TechWomen Program, Women’s Alliance for Knowledge Exchange (WAKE), and GirlHype South Africa.
I have been volunteering since I was a child. I started volunteering at the library, putting books back on the shelves, and then at a local convalescent hospital where I wheeled the elderly to the cafeteria for their meals. I don’t recall a time in my life when I was not volunteering. When I had young children I volunteered where young children could be involved, for example one year we volunteered at the Special Olympics helping the participants get from one event to the next. On average I volunteer about 15 hours per month with peaks and lows throughout the year depending on the events.
I used to volunteer sporadically across many organizations for one-time opportunities. A few years ago I got more organized. I now support three organizations that I feel passionate about and help them year round with ongoing projects.
My TechWomen Story
In 2012 Symantec sent out an email asking women to volunteer for the TechWomen program. I applied and was accepted, and have been involved ever since. The TechWomen program – a U.S. Department of State’s Educational and Cultural Affairs’ initiative – “empowers, connects, and supports the next generation of women leaders in science, technology, engineering, and mathematics (STEM) from Africa, Central Asia, and the Middle East by providing them the access and opportunity needed to advance their careers, pursue their dreams, and inspire women and girls in their communities.” Over the past three years, 156 women from Algeria, Cameroon, Egypt, Jordan, Kenya, Lebanon, Libya, Morocco, Nigeria, the Palestinian Territories, Rwanda, Sierra Leone, South Africa, Tunisia, Yemen, and Zimbabwe have participated in TechWomen. This year the program will expand to include women from Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan.
I am a Professional Mentor with TechWomen, and last year we hosted 6 emerging leaders. We had 11 Symantec women volunteering as Professional or Cultural Mentors. We reached out to our peers and over 40 Symantec employees helped provide training during the month of October. Collectively, over 700 volunteer hours were recorded and submitted to Symantec’s Dollars for Doers program, which provides cash grants to organizations where employees volunteer. The Institute of International Education (IIE.org) received a check for $10,095 from Symantec which was allocated to the TechWomen Grants Program. The women who are mentored through TechWomen return home and often start their own businesses or NGOs. They can apply and receive funding from the TechWomen Grants Program to fund their projects.
Symantec’s Dollars for Doers Program rewards sustained volunteerism by making a monetary contribution to organizations where employees volunteer their time. Symantec donates $15 for every hour of volunteer service that an employee contributes up to $1,000 per calendar year, beginning with the first hour of service. |
Come October we will greet our next group of TechWomen Emerging Leaders and I will spend the full month mentoring a woman from the Middle East or Africa. She will come to work with me every day and we’ll complete a project where she gains technical and soft skills to take back to her job and share with others. I am also on the selection committee, so I read approximately 40 applications and make recommendations on who should be accepted into the program. Every year I also travel to two countries in the Middle East and Africa as part of the TechWomen Delegation trips and help facilitate workshops to introduce young girls to technical careers. I literally stuff about 6-8 old motherboards into my suitcase and teach the girls how to take the components on/off, like CPU’s, memory, batteries, transistors etc.
Ouafar Alami, 2014 Emerging Leader from Morocco, shares her TechWomen experience at Symantec. |
An Experience to Remember
It’s hard to describe how inspiring it is to witness the learning process and see these young women from remote communities in Africa and the Middle East beam with pride once they’ve “got it.” One of the lessons I share on the trips is how a server motherboard works. On every occasion, the girls would look at the motherboard with fear and near panic, however in just 30-40 minutes they start grinning with delight because they can name the components and tell you the jobs each component does.
It’s thrilling to watch it unfold every time.
Developing personal relationships with women from the Middle East and Africa has helped me demystify much of the hyperbole we receive from our news media sources. Traveling to places like Rwanda and Tunisia were life changing opportunities that have improved my world perspective and made me more humble.
I cannot rest knowing that women and girls are being treated unfairly in most of the world. Many are denied access to education and basic human rights. What drives me to continue giving to these organizations is knowing that each time I help another women or girl, they help someone else, and that kindness grows exponentially. There are talented people everywhere, however opportunity is not. Any little bit that each of us can contribute to help others adds up to make a big difference.
Eileen Brewer is Symantec's Senior Manager, Security Appliances Team, MV
Save the date for the next Midwest DLP User Group Meeting!
Date: July 29, 2015 12pm to 4pm
Location: Maggiano's Little Italy (Dolcetto Room) - Westfield Old Orchard, 4999 Old Orchard Center, Skokie, IL 60077
Topics: TBD
Look forward to seeing everyone!
REGISTER HERE!
Questions about Symantec User Group Programs, please email user_groups@symantec.com
Thank you!
My journey as an LGBT ally and advocate began some years ago, after conversations with a gay co-worker, with whom I traveled extensively for work. We had been traveling together for years, and I was oblivious to his sexual identity until he came out to me, about six years into our trips. I realized that he was the first gay person I had met (or rather the first to come out to me) and how unaware I was concerning the struggles and inequality faced by the LGBT community and their loved ones.
Shortly afterwards, I discovered the local Orlando/Central Florida PFLAG (Parents, Families and Friends of Lesbians and Gays) chapter. PFLAG was founded in 1972 with the simple act of a mother publicly supporting her gay son. It is now the nation’s largest family and ally organization. PFLAG opened my eyes. It was through PFLAG that I learned, from a grassroots level, what families with LGBT children go through when their child comes out. It was heartbreaking to witness parents’ feelings, from bewilderment and confusion to fear and anger, while at the same time worrying for their children’s safety and well-being. Members of the LGBT community come to PFLAG looking for the “home” they do not have after they have been shunned by their families and friends. It was very difficult to hear their stories, but under the wings of their PFLAG “family” amazing things happened – providing support and resources has led to so many sincere friendships and such satisfaction as I see parents evolve and their children absolutely excel many, many times. I’ve been a member of PFLAG for 16 years and served as president of PFLAG Orlando/Central Florida chapter for 11 years.
I am passionate about increasing awareness and understanding of LGBT individuals, especially youth and transgender individuals. PFLAG’s stance on transgender inclusion educated me on the importance of this community. I work extensively in the transgender community and, over time, I have learned an immense amount about individuals, organizations, and resources for LGBT persons needing assistance. I now advocate based on what I know – volunteering for organizations like the Orlando Youth Alliance and Zebra Coalition (for homeless youth) and serving as a member the Equality Florida Board of Directors.
At Symantec, I’ve found a community of LGBT allies and advocates in SymPride. Working with my fellow SymPride members, I helped identify the Human Rights Campaign’s Corporate Equality Index as a priority, and initiated a change in the Symantec diversity policy to include “gender identity and expression,” which led to Symantec’s 100% with HRC’s Corporate Equality Index, a measure of how inclusive corporations are of LGBT employees. Now that these and other inclusive policies are in place, our company has scored 100% on the Corporate Equality Index for 7 years in a row.
I’m writing this post today to demonstrate that all of us, no matter how “oblivious” we might feel, have the capacity and power to understand those who might be different, and help them feel safe, welcome and at home. This is how I define being an ally and I believe that Symantec, as a company, espouses the very same values in the products we make and the difference we hope to make in the world.
In 2014, Pat was selected among 50 distinguished Central Florida LGBT leaders to be honored with Congressional recognition for their accomplishments. Pat was the only ally in the group. Her children and grandchildren attended with her, and were as excited at the honor as she was.
Pat Padilla is Symantec's Associate Sales Operations Specialist
Attending to all of the day to day routines in running a small business can eat up so much of your time that you don’t have any spare moments (or energy left) to devote to actually growing your business. Everything seems to fall into the bucket of “get it done and out the door.”
We’re here to help.
There are only so many ways to reduce the costs of running your business no matter how silver-tongued your negotiations may be, and one person can only juggle so many hats when trying to be the owner, customer service manager, IT department, and graphic designer all rolled into one. (Whew!)
Take a breather and discover some easy things you can do tomorrow to help your business grow. Let’s get right to them!
Let your site visitors know their transactions are secure
People care about security—a lot. They also care about appearances. There’s a reason why your local bank always has employees dressed to the nines, cameras everywhere, and a security guard.
Use this frame of mind when designing your website. With all of the stories of data breaches hitting the news, customers are more wary than ever about handing over their credit card information. They want to feel secure.
Assure them right up front by displaying a SSL (Secure Socket Layer) Trusted Site Certificate in a highly visible location. Use it in multiple places, like your home page, login page, and buy page. It’s recognized worldwide and immediately assures people that they’re dealing with the right business—you.
Show visitors the green bar
Not all SSL certificates are created equally. EV (Extended Validation) certificates include a green bar where you type the URL. The exact appearance differs slightly depending upon which browser you’re using. No doubt you’ve seen this when visiting your financial institution online.
Now, your average customer isn’t going to think, “Aha! That site is using a certificate with extended validation. Cool!” But customers will recognize the visual cue (green means go), and they will have seen it at other sites known for their security and be assured they’re not on some phishing site.
Moving over to EV SSL certificates is painless and it’s an easy way to lump your small business in with the big boys for a fairly nominal annual cost.
Avoid cutting corners on security
To many small businesses, every dollar counts. But while you can save the freshly stocked break area for later, online security doesn’t fall into the “nice to have” category. It’s now essential. One data breach is all it takes to destroy everything that you’ve worked so hard to build up.
While the number of mega breaches decreased in 2014, according to the 2015 Website Threat Security Report, the overall number of breaches increased. As the report recommends, keeping your server configuration up to date and ensuring that old, unsecure versions of the SSL protocol (SSL2 and SSL3) are disabled, and newer versions of the TLS protocol (TLS1.1 and TLS1.2) are enabled and prioritized is the way to go.
Sound like technobabble gobbledygook? It isn’t hard to implement, and the digital stitch in time here could pay off far more than saving time later. Talk to your SSL salesperson and make sure you’re up to speed.
While you may not have the budget of some major corporation (yet!), these methods are some easy ways to tweak your SSL certificates and help you get the most mileage out of them.
Have you read the news lately? It seems like hardly a week can go by without another data breach happening.
In the past few years, cybercriminals have upped their game considerably, using incredibly sophisticated attacks in growing number. Out of every six large companies, five were targeted last year for attack—that’s a 40% increase over 2013.*
The recent breach on federal employees’ private data, allegedly from China, only underscores the continued looming menace cybercriminals present—and this threat hasn’t gone unnoticed by the feds.
In a January 12 post on the White House Blog, President Obama is quoted as saying: “This is a direct threat to the economic security of American families, and we've got to stop it.” Further adding, "If we're going to be connected, then we need to be protected." So true! And that line of thinking is what prompted the U.S. government’s latest move.
To help combat these attacks, the White House has mandated that all public-facing Web sites of the federal government must implement HTTPS within the next two years.
This is no minor security update. It carries far-reaching implications that extend beyond the fed. Here’s what we mean.
What HTTPS Offers to Everyone
HTTPS provides a secure line of communication over the Internet, combining the usual HTTP (Hypertext Transfer Protocol) that you see in the address bar of unsecure sites, with SSL (Secure Sockets Layer) that you’re likely to see on most sites involving financial transactions.
This federal move shouldn’t come as a surprise, as the majority of the U.S. government sites have already made the switch to the secure protocol. This includes whitehouse.gov, which made the switch on March 11, 2015, to other federal sites that made the jump earlier, like ftc.gov, donotcall.gov, and others.
This goes beyond the initial site communication handshake—drilling down to subdomains, like examplesection.whitehouse.gov, too.
Up until now, many government sites are current with NIST-recommended SSL standards, but the administration has now moved to make prioritizing security and privacy a common practice among all aspects of federal government sites.
Make no mistake about it, this is huge!
These extra security measures follow the Always On SSL tenets advocated by the Online Trust Alliance, exhibiting some of the strongest moves yet to protect the identity and personal information of U.S. citizens online.
Others Must Follow, Strengthening the Security of the Web
Cybercrime isn’t going to easily back down.
Now, it’s far too easy to compromise private information on sites with subpar security. Today’s cybercriminals are smart and tenacious. By protecting all aspects of a site with SSL—not just transaction pages—businesses can help quell social engineering techniques. These complex ruses can now fool even the savviest netizens into handing over their private information to the bad guys.
Nothing is 100% unhackable now and forever. But just like locking your car doors when you’re out, providing as much security as possible is still a good great idea! By expanding the coverage of SSL, we help further the strength and backbone of the Internet itself.
Remember how quick it was to register your bank’s .com and other domains. You went to your registrar’s homepage, typed in preferred domain names, clicked a few times, entered billing information and you were done. Within a few seconds, you had confirmations and a new online home.
It will take a little more effort and a little more time to register new .BANK domains for your bank’s trademarks, trade names and service marks, but it’s worth it. Here’s why:
All .BANK domains will be verified by Symantec before the registration is confirmed; part of the enhanced security requirements for .BANK domains required by the .BANK registry fTLD. Because this process cannot be fully automated, it requires that we talk to one or two people at your bank.
Verification ensures that only eligible institutions – banks, bank associations, regulators and certain core service providers – have .BANK domains. It also ensures that the person registering .BANK domains for your bank is authorized to do so. Verification protects the integrity of the .BANK gTLD and the integrity of the banks and other organizations that register .BANK domains. You can learn more about the verification process and Symantec’s role here.
During the registration process you will be asked for the bank’s contact information, regulatory ID number, and the government regulatory authority that charters your bank.
You registrar will also request the name and contact information of someone at your company who can verify the employment information of the registrant contact and the share the name and contact information for someone who can verify that the registrant contact is authorized to register the domains requested.
You can help make the registration process smooth and quick by following a few simple guidelines.
These few additional steps will help ensure that you get the okay for your .BANK domains as fast as possible. The process typically takes a day of two. It is not as fast as a click, but your bank’s new .BANK domains will set a solid foundation on which to build and maintain your online brand.
Software Defined Storage is modifying the way storage is being consumed. With the increase of cores per server and server-side storage slots available, software is the key aspect to virtualize all those components and unlock the performance and capacities of faster networks and processors.
While VERITAS has being virtualizing storage for decades, its new generation software allows cost-effective solutions where SAN is no longer needed for traditional workloads avoiding high investments that were needed before. The architecture proposed in this white paper is able to read data at 15GB/s just using commodity servers and HDDs. Think in a traditional SAN how many HBA’s are needed to provide a similar performance.
Software really unlocks the potential of HW. And remember, a truly SDS solution should be agnostic so it should avoid any HW lock-in.
This White Paper presents a typical architecture for a leading analytics application like SAS Grid, where traditionally a SAN is needed. Using severs with 25 internal HDDs we can achieve a traditional SAS Grid architecture that satisfices their high I/O requirements.