Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all 5094 articles
Browse latest View live

Redkit により Web で赤信号が点灯

$
0
0

6 月 26 日、シマンテックは Segway 社の Web サイトに対する悪用キットの攻撃を確認しました。シマンテックからこの攻撃に関する通知を受けた Segway 社はすでに、同社の Web サイトが侵入を受けないよう対策を講じています。このブログでは、Redkit 悪用キットを使った攻撃の詳細を説明します。

攻撃の詳細

コードが jQuery スクリプトにインジェクトされます。

Redkit 1 edit_0.png

図 1.コードがインジェクトされた jQuery スクリプト

悪質なコードは、jquery.min.js という JavaScript に存在します。

Redkit 2 edit.png

図 2. jquery.min.js に存在する悪質なコード

インジェクトされた JavaScript が悪質な iframe をデコードし、それがユーザーをランディングページにリダイレクトします。リダイレクト後には cookie も設定されますが、これは同じユーザーが 2 回以上侵入を受けないようにするためです。

Redkit 3-1 edit.png

デコードすると、以下のようになります。

Redkit 3-2 edit.png

図 3. JavaScript が悪質な iframe をデコード

この iframe によって、以下の Redkit ランディングページにリダイレクトされます。

  • [削除済み]. [削除済み].co.uk/abcd.html

このランディングページは JNLP(Java Network Launch Protocol)をロードして、悪質な JAR ファイルを呼び出します。悪用に成功すると、JAR ファイルは「Open Connection」を使って、不明瞭化された形で "param value=" から URL を受け取ります。

Redkit 4 edit.png

図 4."param value=" から取得される不明瞭化された URL

エンコードされた文字列は、以下の URL に解決されます。

  • http://[削除済み]. [削除済み].co.uk/19.html

JNLP スクリプトは、悪質な JAR ファイルをユーザーのコンピュータ上に配備するために使われます。

Redkit 5 edit.png

図 5. 悪質な JAR ファイルの配備に使われる JNLP スクリプト

JAR ファイルの URI は次のとおりです。

  • http://[削除済み]. [削除済み].co.uk/8o.jar

現在の JAR ファイル名は、80.jar、sj.jar、7t.jar のように長さが 2 文字です。これらの JAR ファイルは、暗号化されたペイロードをダウンロードし、暗号方式を利用して復号します。

この攻撃に使われている JAR ファイルは、Java データ型の混乱の脆弱性(CVE-2012-1723)を悪用しています。

Redkit 6 edit.png_0.png

図 6. Java データ型の混乱が悪用される

URL のデコードに使われる暗号方式は、JNLP を介してパラメータとして渡されますが、単純な文字置換アルゴリズムです。

Redkit 7 edit_0.png

図 7. URL のデコードに使われる暗号方式

この攻撃では、以下の複数のマルウェアが投下されます。

Redkit 8 edit_0.png

図 8.攻撃のシナリオ

まとめ

Redkit は 2012 年初めに登場し、それ以来同じ方法で拡散しています。今回シマンテックが発見したように、悪質な iframe でハッキングされたサイトから悪用キットのランディングページにリダイレクトされます。フィンガープリントにプラグイン検出スクリプトを使う点は、他の悪用キットと同じです。

最近、シマンテックは以下の URI パターンのランディングページを確認しています。

  • [削除済み]. [削除済み]/hfiv.htm
  • [削除済み]. [削除済み]/hmtg.htm
  • [削除済み]. [削除済み]/hmtg.htm

Redkit が JAR ファイルの配備を開始するときには、その JAR ファイルをロードするプラグインとして JNLP スクリプトを使います。投下された JAR ファイルの名前には、11.jar や 123.jar のように番号が付けられています。JAR ファイルは不明瞭化されており、Java の最新の脆弱性を悪用します。ファイルのペイロードは暗号化されています。

Redkit は、以下のように Java の複数の脆弱性を悪用します。

Redkit は、以下の脅威を投下することが確認されています。



シマンテックは先月、約 150,000 件の Redkit 攻撃を遮断しました。

Redkit_HeatMap_0.png

図 9.攻撃の地理的な拡散状況

地理的に見ると、北米、ヨーロッパ、ロシアの各地域で最も多く影響が確認されています。これらの攻撃の動機は、幅広くユーザーのコンピュータに侵入して利益を上げることにあります。最近では、知的財産を盗み出すためにこれらの攻撃で特定の組織が標的になっています。

保護対策

幸い、シマンテックは Redkit 攻撃に対して包括的な保護を提供しており、侵入防止とウイルス対策のシグネチャを更新することで保護されます。侵入防止では、コンピュータ上で送受信されるネットワークトラフィックをすべてスキャンし、その情報を一連の攻撃シグネチャと比較して、インターネット上の代表的な攻撃からユーザーを保護します。

シマンテックは、お客様をこの攻撃から守るために、以下の保護対策を提供しています。

侵入防止:

ウイルス対策:

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。


マイクロソフト月例パッチ(Microsoft Patch Tuesday)- 2013 年 7 月

$
0
0

今月のマイクロソフトパッチリリースブログをお届けします。今月は、36 件の脆弱性を対象として 7 つのセキュリティ情報がリリースされています。このうち 24 件が「緊急」レベルです。

いつものことですが、ベストプラクティスとして以下のセキュリティ対策を講じることを推奨します。

  • ベンダーのパッチが公開されたら、できるだけ速やかにインストールする。
  • ソフトウェアはすべて、必要な機能を使える最小限の権限で実行する。
  • 未知の、または疑わしいソースからのファイルは扱わない。
  • 整合性が未知の、または疑わしいサイトには絶対にアクセスしない。
  • 特定のアクセスが必要な場合を除いて、ネットワークの周辺部では重要なシステムへの外部からのアクセスを遮断する。

マイクロソフトの 7 月のリリースに関する概要は、次のページで公開されています。
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-Jul

今月のパッチで対処されている問題の一部について、詳しい情報を以下に示します。

  1. MS13-052 .NET Framework と Silverlight の脆弱性により、リモートでコードが実行される(2861561)

    TrueType フォントの解析の脆弱性(CVE-2013-3129)MS の深刻度: 緊急

    影響を受けるコンポーネントが、特別に細工された TrueType フォントファイルを処理する方法に、リモートコード実行の脆弱性が存在します。この脆弱性により、特別に細工された TrueType フォントファイルをユーザーが開いた場合に、リモートでコードが実行される場合があります。攻撃者がこの脆弱性の悪用に成功すると、影響を受けるシステムを完全に制御できる恐れがあります。攻撃者はその後、プログラムのインストール、データの表示、変更、削除、完全な管理者権限を持つ新しいアカウントの作成ができる場合があります。

    配列アクセス違反の脆弱性(CVE-2013-3131)MS の深刻度: 緊急

    .NET Framework がサイズの小さな構造体の多次元配列を処理する方法に、リモートコード実行の脆弱性が存在します。

    デリゲートリフレクションを回避する脆弱性(CVE-2013-3132)MS の深刻度: 重要

    リフレクションを実行する特定のオブジェクトの権限を .NET Framework が検証する方法に、特権昇格の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、影響を受けるシステムを完全に制御できる恐れがあります。

    匿名メソッドのインジェクションの脆弱性(CVE-2013-3133)MS の深刻度: 重要

    リフレクションに関係するオブジェクトの権限を .NET Framework が検証する方法に、特権昇格の脆弱性が存在します。

    配列割り当ての脆弱性(CVE-2013-3134)MS の深刻度: 緊急

    .NET Framework がサイズの小さな構造体の配列を割り当てる方法に、リモートコード実行の脆弱性が存在します。

    デリゲートシリアル化の脆弱性(CVE-2013-3171)MS の深刻度: 重要

    .NET Framework がシリアル化中にデリゲートオブジェクトの権限を検証する方法に、特権昇格の脆弱性が存在します。

    NULL ポインタの脆弱性(CVE-2013-3178)MS の深刻度: 重要

    Silverlight が NULL ポインタを処理する方法に、リモートコード実行の脆弱性が存在します。

  2. MS13-053 Windows カーネルモードドライバの脆弱性により、リモートでコードが実行される(2850851)

    Win32k のメモリ割り当ての脆弱性(CVE-2013-1300)MS の深刻度: 重要

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない場合に、特権昇格の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

    Win32k 逆参照の脆弱性(CVE-2013-1340)MS の深刻度: 重要

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない方法が原因で、特権昇格の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

    Win32k の脆弱性(CVE-2013-1345)MS の深刻度: 重要

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない方法が原因で、特権昇格の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

    TrueType フォントの解析の脆弱性(CVE-2013-3129)MS の深刻度: 緊急

    影響を受けるコンポーネントが、特別に細工された TrueType フォントファイルを処理する方法に、リモートコード実行の脆弱性が存在します。この脆弱性により、特別に細工された TrueType フォントファイルをユーザーが開いた場合に、リモートでコードが実行される場合があります。攻撃者がこの脆弱性の悪用に成功すると、影響を受けるシステムを完全に制御できる恐れがあります。攻撃者はその後、プログラムのインストール、データの表示、変更、削除、完全な管理者権限を持つ新しいアカウントの作成ができる場合があります。

    Win32k の解放後の使用方法に脆弱性(CVE-2013-3167)MS の深刻度: 重要

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない方法が原因で、情報漏えいの脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

    Win32k のバッファオーバーフローの脆弱性(CVE-2013-3172)MS の深刻度: 警告

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない方法が原因で、サービス拒否の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

    Win32k のバッファ上書きの脆弱性(CVE-2013-3173)MS の深刻度: 重要

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない方法が原因で、特権昇格の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

    Win32k の読み取り AV の脆弱性(CVE-2013-3660)MS の深刻度: 緊急

    Windows カーネルモードドライバがメモリ内のオブジェクトを正しく処理しない方法が原因で、特権昇格の脆弱性が存在します。攻撃者がこの脆弱性の悪用に成功すると、昇格した特権で任意のコードを実行できる場合があります。

  3. MS13-054 GDI+ の脆弱性により、リモートでコードが実行される(2848295)

    TrueType フォントの解析の脆弱性(CVE-2013-3129)MS の深刻度: 緊急

    影響を受ける Windows コンポーネントと、影響を受ける他のソフトウェアが、特別に細工された TrueType フォントファイルを処理する方法に、リモートコード実行の脆弱性が存在します。この脆弱性により、特別に細工された TrueType フォントファイルをユーザーが開いた場合に、リモートでコードが実行される場合があります。攻撃者がこの脆弱性の悪用に成功すると、影響を受けるシステムを完全に制御できる恐れがあります。攻撃者はその後、プログラムのインストール、データの表示、変更、削除、完全な管理者権限を持つ新しいアカウントの作成ができる場合があります。

  4. MS13-055 Internet Explorer 用の累積的なセキュリティ更新プログラム(2846071)

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3115)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3143)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3144)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3145)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3146)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3147)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3148)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3149)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3150)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3151)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3152)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3153)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3161)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3162)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3163)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    Internet Explorer のメモリ破損の脆弱性(CVE-2013-3164)MS の深刻度: 緊急

    Internet Explorer のメモリ内のオブジェクトへのアクセスが不適切な場合に、リモートコード実行の脆弱性が存在します。この脆弱性によってメモリが破損し、攻撃者が現在のユーザーのコンテキストで任意のコードを実行できる場合があります。

    シフト JIS 文字エンコードの脆弱性(CVE-2013-3166)MS の深刻度: 重要

    Internet Explorer にクロスサイトスクリプティング(XSS)の脆弱性が存在するため、攻撃者は他のドメインまたは Internet Explorer ゾーンの情報にアクセスできる場合があります。攻撃者が、特別に細工された Web ページを作成してこの脆弱性を悪用すると、ユーザーがその Web サイトを開いたときに情報が漏えいしてしまいます。攻撃者がこの脆弱性の悪用に成功すると、他のドメインまたは Internet Explorer ゾーンからコンテンツを閲覧できる場合があります。

  5. MS13-056 Microsoft DirectShow の脆弱性により、リモートでコードが実行される(2845187)

    DirectShow の任意メモリの上書きの脆弱性(CVE-2013-3174)MS の深刻度: 緊急

    Microsoft DirectShow が GIF ファイルを解析する方法に、リモートコード実行の脆弱性が存在します。この脆弱性により、特別に細工された GIF ファイルをユーザーが開いた場合に、リモートでコードが実行される場合があります。ユーザーが管理者ユーザー権限でログオンしている場合は、この脆弱性の悪用に成功した攻撃者が、影響を受けるシステムを完全に制御する可能性があります。攻撃者はその後、プログラムのインストール、データの表示、変更、削除、完全なユーザー権限を持つ新しいアカウントの作成ができる場合があります。システムでのユーザー権限が低い設定のアカウントを持つユーザーは、管理者のユーザー権限で実行しているユーザーよりもこの脆弱性による影響が少ないと考えられます。

  6. MS13-057 Windows Media フォーマットランタイムの脆弱性により、リモートでコードが実行される(2847883)

    WMV ビデオデコーダにリモートコード実行の脆弱性(CVE-2013-3127)MS の深刻度: 緊急

    Windows Media フォーマットランタイムが特定のメディアファイルを処理する方法に、リモートコード実行の脆弱性が存在します。この脆弱性により、特別に細工されたメディアファイルを開くよう攻撃者が誘導した場合に、任意のコードが実行される可能性があります。攻撃者はその後、プログラムのインストール、データの表示、変更、削除、完全なユーザー権限を持つ新しいアカウントの作成ができる場合があります。

  7. MS13-058 Windows Defender の脆弱性により、特権が昇格される(2847927)

    Microsoft Windows 7 Defender の不適切なパス名の脆弱性(CVE-2013-3154)MS の深刻度: 重要

    これは、特権昇格の脆弱性です。攻撃者がこの脆弱性の悪用に成功すると、LocalSystem アカウントのセキュリティコンテキストで任意のコードを実行し、システムを完全に制御する可能性があります。攻撃者はその後、プログラムのインストール、データの表示、変更、削除、完全なユーザー権限を持つ新しいアカウントの作成ができる場合があります。この脆弱性を悪用するには、攻撃者が有効なログオン資格情報を所有している必要があります。匿名ユーザーによってこの脆弱性が悪用される可能性はありません。

今月対処されている脆弱性についての詳しい情報は、シマンテックが無償で公開している SecurityFocusポータルでご覧いただくことができ、製品をご利用のお客様は DeepSight Threat Management System を通じても情報を入手できます。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。

Shadowlock との遭遇

$
0
0

Trojan.RansomlockTrojan.FakeavlockTrojan.Winlockのようにコンピュータをロックするマルウェアの同類として、Trojan.Shadowlockが出現しました。ただし先行する同類のマルウェアとは異なり、Trojan.Shadowlock はすぐにオンライン送金を要求するのではなく、オンラインアンケートに入力することを「推奨」します。アンケートは一般的にほとんど儲けはありませんが、長い目で見れば最終的にはプラスになります。Trojan.Shadowlock に関しては、作成者がユーモアのセンスを持ち合わせているらしく、リバースエンジニアリングで見つかるように一種のイースターエッグが仕掛けられています。映画『未知との遭遇』で使われた、あの 5 音のメロディが再生されるのです。このメロディはあまりにも有名で、あらゆるメディアに何度も登場してきました。今回、マルウェア作成者はユーザーのコンピュータに感染するプロセスの一部としてこれを実装しています。

技術的な詳細

実行すると、次のようなポップアップメッセージが表示されます。

Shadowlock 1.png

図 1.コンピュータのロックを解除するためのポップアップメッセージ

このメッセージは画面に表示され続けますが、移動することは可能です。閉じるボタンをクリックしてメッセージを閉じようとすると、ロック解除の失敗と見なされます。タスクマネージャ、コマンドプロンプト、PowerShell、Regedit、MSConfig などさまざまなツールを使ってマルウェアの無効化を試みてもすべて拒否され、復元ポイントに戻る試みさえ Trojan.Shadowlock によって妨害されてしまいます。ロック解除コードの入力を 3 回失敗するとシステムがシャットダウンされ、再起動しても 20 秒後にはまたポップアップメッセージが表示されます。したがって、この 20 秒間のうちに上述のツールを使えば、Shadowlock は無効化できることになります。その点で、今回のマルウェア作成者はそれほど破壊的ではなさそうです。アンケートに答えることを選択した場合は、アンケートのリストが表示され、その中から選べるようになっています。

Shadowlock 2 edit.png

図 2.アンケートのリスト

コードを詳しく調べると、いくつか興味深い特徴に気づきます。まず、Shadowlock は .NET で作成されており、インストールして正常に機能するにはバージョン 2.0 以降の .NET Framework が必要です。.NET のデコンパイラで確認すると、Trojan.Shadowlock の内部動作を見ることができます。

Shadowlock 3 edit.png

図 3. Trojan.Shadowlock の最上位層

Trojan.Shadowlock の最上位層は、リソースの復号に関係しています。復号してから Loqvd というリソースを解析すると、BotKill() や EraseStartup() といった関数が含まれていることがわかります。Shadowlock がこれらを使うことはありませんが、ファイルの圧縮解除に利用される関数などは実際に使われています。最上位層は、3 つすべてのリソースの復号に使われます。次に Loqvd を使って、リソース Egg と Iudu の復号されたバージョンが圧縮解除されます。メインのペイロードは、Iudu リソースの中にあります。作成者は、.NET の実行可能ファイルがこのようにデコンパイルできることを知っていて、解析を難しくするために 1 つ以上の層を追加したのかもしれません。

Shadowlock 4 edit.png

図 4. 復号と圧縮解除を経た Iudu リソース

Iudu リソースを調べると、JavaScript を利用した脅威と類似の不明瞭化が使われており、同じように不明瞭化を解除できることがわかります。しばらく経つと、Shadowlock はようやくその機能を明らかにします。Shadowlock は利用者の多いブラウザ(Firefox、Chrome、Internet Explorer、Safari、Opera)を強制終了したり、特定のシステムツールを無効にしたりするなど、各種の処理を実行できます。ハードディスクの空き領域を使い尽くしたり、Windows のファイアウォールを無効にしたりするほか、デフォルトの Web ブラウザを介してショッキングな内容の Web サイトにリダイレクトする機能まで備えています。遊び半分の機能としては、マウスボタンを入れ替える、CD トレーを開ける、「電卓」や「ペイント」のような OS 標準の基本アプリケーションを起動するといった動作もします。

こうした機能の大部分が、コードから呼び出されているのではないことに注意してください。考えられる可能性は 2 つあります。ひとつは、作成者が何らかのコードを発見し、その上にアンケート詐欺を追加しただけの可能性で、もうひとつは作成者がいわば探りを入れているという可能性です。そうなると、これらの機能が(他の機能も含めて)今後の亜種に組み込まれることも考えられます。シマンテックは、この脅威を Trojan.DropperTrojan Horse、または Trojan.Shadowlockとして検出し、脅威から保護します。シマンテックの遠隔測定によると、この脅威はさほど拡散してはいません。とは言っても油断は禁物です。CD トレーが勝手に開いたり、『未知との遭遇』のメロディが流れてきたりした場合は、Shadowlock と遭遇してしまったのかもしれません。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。

Moving Enterprise Vault SQL Databases

$
0
0

A question that comes about frequently relates to what steps need to be performed if one of the Enterprise Vault databases need to be moved to a new location on an existing SQL Server.

The answer is that in most cases this doesn't have anything to do with Enterprise Vault, it's all purely SQL related. However, if you want to do the belt and braces approach, I'd suggest the following:

- Stop the EV Admin Service
- Move the database using SQL Server Management Studio
- Start the EV Admin Service

The reason for the 'full stop' rather than just putting EV in to read-only mode is that whilst in read-only mode retrievals, and queries in general are still needed against the Enterprise Vault databases.

Virtual Volunteering - Volunteer Wherever and Whenever you Want

$
0
0

The advancement of technology has brought us endless benefits. We can now video chat with a friend across the world for free. We can watch our favorite movies on the plane, at the park or in the car. In an emergency we can contact our loved ones instantly.

In my role at Symantec, technology has completely changed the volunteering landscape. How, you might ask? A key way is through the advent, and now increase, of virtual volunteering opportunities. With virtual volunteering employees can now volunteer from their desk, their home, or wherever they have an Internet connection.  This is huge for so many people, who may be deterred from volunteering due to time or life contstraints, or may not find a local opportunity that matches their interests.

For example, the United Nations Volunteers (UNV) helps both volunteers and development organizations find online volunteering opportunities (or volunteers) through their onlinevolunteering.org website. The UNV program is a great example of the breadth of opportunities that arise by enabling ‘virtually’ anyone in the world to contribute. UNV OVs have helped UNDP Brazil spread the word about the Rio+20 Dialogues, translated key documents for a local project in the Issyk-Kul area of Kyrgyzstan, produced a 400 page informational backgrounder on entrepreneurship in Africa, and much more. In 2010, the UN Volunteers program included approximately 9,000 online volunteers from around the world, and marked the first time the UNV's online volunteers outnumbered on-site volunteers.

At Symantec, virtual volunteering has become central to our corporate philanthropy strategy and enables us to tap the passion of our 21,000 employees in over 50 countries worldwide.

For example, thanks to virtual volunteering, interns in locations all around the world will have the opportunity to participate in Symantec’s first annual Intern Volunteer Week - taking place next week from July 15 – 19. Many thanks to Monica Ipong for driving this idea! Symantec employees can contribute hours to their department interns by logging hours on the Intern Volunteer Week Intranet site. The intern with the most hours will win a one-on-one Q&A Session with Bettina Koblick, SVP and Chief Human Resources Officer, and will be featured in an intranet article.

Interns will have the chance to participate in two virtual volunteering opportunities:

#1 Virtual Volunteering with the NPower Community Corps:

Surveys show that U.S. non-profits identify technology as one of their most mission critical needs. However, 88 percent of non-profits in the US have little to no in-house IT resources.

The NPower Community Corps is a unique, online, and highly scalable social good marketplace where non-profits and schools can post requests for volunteers from the tech community and volunteers and corporations can find opportunities to give back tocauses they care about using their skills.

To learn more and sign up visit: https://thecommunitycorps.secure.force.com/volunteers/VolLanding

#2 Virtual Volunteering with We Teach Science

Only 1 in 3 students in CA pass 8th grade Algebra. We Teach Science recruits STEM professionals to work with middle school students through their remote tutoring and mentoring program. Through We Teach Science, interns will volunteer one hour per week from their computer with a web-based interactive whiteboard and headset w/microphone.  

One of the primary ways Symantec has a positive impact on local communities is through our volunteer efforts. We believe that the communities where Symantec maintains offices should be stronger and more vibrant because of our presence and that our employees are best positioned to understand the needs of their communities.

We hope interns all across the world will join us virtually for Intern Volunteer Week, and see how easy it is to make a difference with the click of a mouse.  

Do you want to support a cause and give back to your community, but just can’t find the time? Or when you do find the time, you don’t know where to start looking for volunteer opportunities? Contact us at community_relations@symantec.comto learn more about virtual volunteering opportunities at Symantec!

 

Ashley Savageau is Community Relations Program Manager at Symantec.

*NEW RELEASE* Symantec Data Insight 4.0

$
0
0

Overview

The explosion of unstructured dark data shows no sign of slowing. Gartner estimates that by 2018, 25% of organizations will manage all their unstructured data using information governance and storage management policies, up from less than 1% today, to improve business value, reduce risk and lower management cost*. Symantec Data Insight helps organizations improve unstructured data governance through actionable intelligence into data ownership, usage and access.  Data Insight’s reporting, analytics and visualization capabilities give organizations an understanding of what data exists, how the data is used, who owns the data and who has access to the data. These drive efforts in efficiency and cost reduction across the data lifecycle as well as help drive improved protection of sensitive data and achieve compliance.

Data Management and Storage Optimization:

  • Clean-up orphan data. Discover inactive or orphan data, engage the owners in a data cleanup or retention effort. Automate the remediation using Symantec Enterprise Vault for archiving or implement custom actions such as deletion.
  • Intelligent data movement decisions. Understand usage and consumption patterns and visualize users/groups for data migration, tiering, consolidation or restructuring efforts.
  • Improve accountability for storage use. Identify data owners and lines of business responsible for data for business-level consumption or chargeback reporting to promote storage efficiency.

Data Protection and Compliance:

  • Audit permissions and fix open access. Enable custodians to review access permissions or entitlements to their data for compliance.  Discover overly permissive access rights and facilitate secure collaboration with access visualization and analytics.
  • Monitor data activity. Understand who is using the data, how often they are accessing it, and proactively monitor for anomalous activity or outlier users.
  • Improve accountability for data protection and security. Identify data owners for compliance purposes as well as for securing confidential data with Symantec Data Loss Prevention integration.

Discover, analyze and remediate with Data Insight 4.0. New features include:

Detailed Insights and Visibility

  • Interactive ContextMap to navigate dark data with context to inform data management and risk reduction efforts
  • Correlated Data Loss Prevention and Data Insight intelligence for SharePoint

Advanced Analysis

  • Social Network Analysis to enable secure collaboration and data management planning
  • What If analysis and recommendations for access lockdown
  • Flexible query interface for ‘long-tail’ analysis and business process integration

Integrated Actions

  • Automatically archive data using Symantec Enterprise Vault
  • Flexibility to implement custom actions for disposition, migration and access control efforts

 

Product Requirements

Supported Platforms

  • Microsoft Windows Server 2003, Enterprise Edition (32-bit) SP2 or higher
  • Linux RHEL 5.5+ (Indexer software only)
  • VMware ESX Server 3.5

Supported File Servers

  • Microsoft Windows File Server 2003 SP1 or higher, Windows 2008 (64-bit)
  • NetApp DataONTAP version 7.3.1 or higher
  • EMC Celerra DART version 5.6.45 or higher
  • SharePoint 2007, 2010 and 2013
  • Unix with Veritas Storage Foundation 6.0

Package Information

Product Download:  http://fileconnect.symantec.com

Documentation

Documentation can be found within the software package on File Connect and in the Altiris Knowledge Base.

Data Insight technical articles are located in the Altiris Knowledgebase.  Login credentials are required. If you do not have your login credentials, they can be requested from the Altiris Knowledgebase Login page. Please add “Data Insight customer” in the comments of your login request.

Manuals:

Data Insight 4.0 Release Notes
Data Insight 4.0 Installation Guide
Data Insight 4.0 Administrator’s Guide
Data Insight 4.0 User’s Guide

Resources:

Data Insight Product Page

*Gartner: Innovation Insight: File Analysis Innovation Delivers an Understanding of Unstructured Dark Data

The Art of Losing (Your Best Cyber Professionals)

$
0
0

-- Originally published July 2nd on StateScoop --

I was on a panel in Alaska a few weeks back, and the topic shifted to public- versus private-sector innovation.

The non-controversial part of my response was that state governments are innately a bit more cautious and deliberate in their technology decision-making. In fact, states tend to stay anywhere from a few months to a few years behind the private sector’s technology adoption pace.

But the mildly controversial part of my response was that I found this trend generally unproblematic. Unlike some government contractors, I’m not in favor of pushing bleeding-edge innovations on state government buyers before they’re ready.

But I have one exception to that rule—cybersecurity.

In the rapidly evolving, real-time-centric field of cybersecurity, there is simply no place for a two-year (or even two-month) lag in technology advancement.

In fact, if a state ever finds itself two years behind in cybersecurity, that’s a legitimate crisis.

But here’s the real problem: It’s not just up-to-the minute systems that states need in order to protect their critical infrastructure—it’s up-to-the minute professionals.

Meanwhile, the private sector keeps cherry-picking all the top talent in state government agencies, offering salaries well beyond what public-sector pay scales allow. As a result, it’s quite challenging for states to find, develop, and retain upper-echelon cyber professionals.

And as if things weren’t bad enough, state governments also have a geography problem—by virtue of operating in cities like Albany, Sacramento, and Jefferson City, which aren’t necessarily the largest pools for IT security professionals in their respective states.

But enough about the problem; what’s to be done about it?

First, states are having success attracting candidates by emphasizing non-financial benefits—for instance, the autonomy to work on more interesting, creative projects, and the flexibility to work remotely.

The new generation of cyber professionals also tends to have a strong sense of mission and public service. So appealing to the importance and societal impact of working in the government space can be an effective recruitment and retention strategy.

Furthermore, government isn’t alone in this fight. While some in private industry are busy poaching top professionals, others are playing a cooperative training role. Symantec, for instance, has been retained in a number of states to help develop their internal IT staff members.

It is true that once these teams are highly developed, individuals may then decide to leave for the private sector in a few years.

But again—to that—I say live and let live.

A continuous influx of newer, younger, more adaptable professionals can actually be an asset to state agencies—as long as they have experts from the private sector to manage the transitions and help maintain essential continuity.

The key point is movement—never stop advancing. This runs counter to the core mentality of most state governments, but it’s absolutely essential.

In cybersecurity, the minute you stop moving is the minute you fall behind.

The FBI’s CJIS Program and Two-Factor Authentication: A Match Made in Logic

$
0
0

-- Originally published July 9th on StateScoop --

Every now and then, state and federal government agencies will collaborate on a project so sensible and logical, that it’s hard to find much—if any—opposition.

The FBI’s Criminal Justice Information Services Division (CJIS) might be one of those projects—a focal point and central repository for gathering and compiling intelligence from local, state, and federal criminal justice agencies.

But there’s another issue pertaining to CJIS that’s practically just as logical and obvious. And yet for some reason, we’re still struggling to put it into practice.

That issue is access control. Once we’ve gotten all of this information compiled, shouldn’t we take the necessary steps to secure it?

The problem isn’t the technology. (Strong authentication systems are readily available.) And it’s not a lack of desire. (It’s hard to imagine anyone wanting a common criminal who breaks into a police cruiser to be able to access a federal crime database.)

The hesitation to implement access control is almost certainly caused by the cost and effort involved with adding strong authentication systems to numerous endpoints.

So in response to this inaction, the Federal Government recently issued a directive mandating state agencies to build strong, two-factor authentication into their CJIS-interfacing systems. And the consequence of failing to do so by September of this year will be losing full access to the database.

That’s a pretty serious incentive—even if it isn’t 100% enforceable at the moment. Eventually, the FBI will be able to effectively cut-off state entities it feels aren’t taking the necessary security precautions. And states should make their investments now, rather than wait for their operations to be disrupted.

Implementing two-factor authentication might not be as simple as flipping a switch, but it doesn’t have to be arduous or even expensive. Companies like Symantec who have experience working with state government agencies can suggest the perfect solution based on your individual needs and requirements.

Ultimately, there’s more than enough reason to make the investments today, instead of waiting for the costs of inaction to outweigh the costs of compliance.

Truly, whenever it comes to the security of your critical information, compliance is a practically a no-brainer.

 


User Ignorance of Cloud Services Poses a Data Leak Challenge

$
0
0
Cloud-based online services are useful tools for many enterprises, allowing them to coordinate their teams, share information and enable discussions within groups. However, companies should be sharply aware of how they manage their privacy settings for these services before discussing business critical matters or uploading sensitive data. 
 
It seems that many Japanese organizations have learned this the hard way. A Japanese newspaper found more than 6,000 cases where public and private organizations exposed internal communications by using the default Google Groups privacy settings. Keeping the default settings allowed for public access to discussion threads rather than making them only accessible to pre-approved members. The newspaper found that hospitals and schools posted records on their patients and students and at least one political party exposed a list of its supporters. In fact, the newspaper itself admitted that its journalists made the same mistake, potentially revealing draft news reports and interview transcripts to the world. 
 
The Japanese government was also involved in this and admitted that officials accidently posted internal memos publicly simply because they used the wrong privacy settings for Google Groups online discussions. This included details on planned negotiations on an international mercury trade treaty along with discussions about this between Swiss and Norwegian environmental ministries. The Japanese environmental ministry’s spokesperson said that while the internal documents were not confidential, it has since taken corrective steps to protect its data. 
 
There have been cases in the past where, even if the cloud service provider has set its default settings to private, users seemingly inadvertently set them to public and exposed data. As a result, more than 12 thousand data buckets were uncovered and almost 2 thousand were visible to the public. The buckets included 126 billion files which included data from social networks, sales records, video game source code and unencrypted database backups. 
 
These cases show how easily sensitive data can be exposed simply by human error as opposed to  malicious attack. The fact that this error was so widespread is worrying and suggests that many simply assumed that their communications were private, rather than checking to see for themselves. Before using any communications tool, always check the privacy settings to ensure that everything is protected. 

Where to find Offline Installers of .NET Framework

$
0
0

If you have to install a .NET Framework software on a computer not connected to Internet or in case you have to install on many computers, don't want to waste time to download several time the online installer , the best choice is run a standalone installer of .NET Framework.

You can download the software from Microsoft using following these link:

VersionDownload
.NET Framework 4.5 Setup

Download 32 bit & 64 bit versions   

.NET Framework 4.0 Setup

Download 32 bit & 64 bit versions

.NET Framework 3.5 Setup

Download 32 bit & 64 bit Versions

.NET Framework 3.5 Setup Service Pack 1

Download .NET 3.5 Service Pack 1

.NET Framework 2.0 Setup

Download 32 bit version

Download 64 bit version

 

Symantec Web Gateway 5.2 Pre-release Evaluation

$
0
0

On 12 August, 2013, Symantec will be launching the pre-release evaluation of Symantec Web Gateway 5.2. This new version of Symantec Web Gateway introduces new features including:

 

  • Hardware and Operating System Upgrades
  • Ability to upgrade the appliance Operating System from the SWG UI.

 

The Symantec Enterprise External Test Program is designed to ensure that customers have a central location to download builds and access to post feedback on the SymBeta forum for Symantec technology experts to review. You can sign up for the evaluation by navigating to the following link.

 

https://symbeta.symantec.com/callout/?callid=8DD5D563195C41BD9A1893AEAD426992

 

A Webinar will also be scheduled on the 12th of August to discuss and field questions around this pre-release evaluation. Details regarding the time and Webex links of the webinar will be provided as an update to this invitation. As with prior pre-release evaluations for Symantec Web Gateway, Symantec will be offering incentives for customers who participate in the evaluation. The following are the incentives offered for this testing period.

 

  • Customers, who install the pre-release evaluation version of SWG 5.2 and provide feedback regarding their upgrade experience via the testing script, will receive a copy of Norton AntiVirus.

 

  • Customers who install of the pre-release evaluation version of SWG 5.2 in production, provide feedback regarding their upgrade experience via the testing script and who generate the most production traffic through their test appliance during the pre-release evaluation (based on stats received by Symantec) will have a chance to win an iPad (there are 4 total available).

 

  • A US$200 value gift card will be given away to the first 5 customers who install the pre-release evaluation version of SWG 5.2 within three weeks of Beta commencement and provide feedback regarding their upgrade experience via the testing script. Having multiple Clients connecting through the SWG 5.2 test appliances with increase your chances of winning. Customers may attain both the gift card and an iPad.

 

If you would like to participate in this pre-release evaluation please sign up at the above SymBeta link and reply to this email with the following information:

 

  1. Will your deployment be in tandem with production or in a lab environment?
  2. Will your deployment be physical or virtual?
  3. Are there any specific areas that you want to focus on testing?
  4. Please provide your appliance serial numbers you will be using for testing if planning on performing an upgrade from the current version?

 

If there are any questions regarding the upcoming pre-release evaluation, please reply to this email or send an email to swg-beta@symantec.com, and a Symantec Web Gateway team member will respond to you shortly.

 

Thank you

Symantec Web Gateway Team

 

Your Guide to Delivering Superior Customer Value—New Symantec Specialization Resource Kits

$
0
0

As a Symantec Partner, you can more quickly and easily deliver superior value to customers when you download a Symantec Specialist Resource Kit and get specialized. When you do, you get easy access to research, sales, marketing and technical IP to help you at every stage in the sales process with a single reference tool—new specialization resource kits.

Resource kits are designed to help you deepen your relationship with customers as their trusted advisor and to confidently guide them through backup, security and archiving and e-discovery challenges. Each kit includes critical information and resources that align with—and support—your sales cycle—from thought leadership, to opportunity development and closure, through implementation.

As an added benefit, you can download and subscribe to the accompanying Symantec Enablement Toolkit module to have new content automatically pushed to your desktop.

Download your kits and increase your value today (login to PartnerNet required):

Enterprise Vault Drives almost completely full?

$
0
0
From time to time it happens that your Vault Store partitions might get almost completely full.  As we've seen Enterprise Vault has a number of protection mechanisms in place which try to prevent the situation where the partitions become 100% full.  These are similar mechanisms to the 'old' Exchange reserve log files, and try to ensure that the services remain in a good state, rather than just crashing when the space is completely consumed.
 
But, when you're getting very close to the maximum size of your vault store partitions, what is there that you can do?
 
The first port of call is that you can create a new partition and close the current one.  This will prevent more data being written to the current partition.
 
Another option would be to do the same, but, also enable and run collections on the now closed partition.  But sometimes this isn't desirable because the data that is on the partition is still actively used by end-users - so if that's the case there isn't much point in doing collections to reduce any space usage, because the CAB files will constantly being extracted back to the originals.
 
Yet another option is that you can create a new Vault Store, and a new underlying partition, and then create new archives for new users on the new vault store. Of course doing this will mean that the old vault store will grow over time, because the users there are still active.  
 
In fact all of these options don't actually reduce the size of the current data spread on to the Vault Store partitions.
 
The 'cure' for that is to use something like the native Enterprise Vault 'Move Archive' utility or a third party product like Archive Shuttle from QUADROtech to move some of the existing mailbox archives to the new Vault Store.
 
Yet another caveat of going the new vault store route is that what you will get back in terms of space is very much dependent on the sharing level within the vault store group. If sharing is enabled across the group, then having another vault store in the same group, and moving archives to that vault store will mean no storage gain - this is because the data in the new vault store is just referencing back to the existing one -- because of the sharing level.
 
If sharing is enabled across the vault store group, and you don't want to change that, then the remaining option is to create a new vault store group, a new vault store, and then a new partition ...  finally you can then move the mailbox archives using the ideas provided above.
 
A secondary question which comes up when data is moved to a new vault store is what happens with the existing shortcuts in the mailbox? Well, those will be rewritten by the utilities that I mentioned to point to the new location.
 

Data Insight 4.0 Turns Dark Data From A Liability To A Business Asset

$
0
0

data insight.jpgDark Data.

The term may sound ominous and mysterious, like something out of deep space. Analyst firm Gartner defines dark data as "the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes. Similar to dark matter in physics, dark data often comprises most organizations' universe of information assets."

Today we are announcing Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data, which is generally poorly managed and stored. Many data centers literally have petabytes of unstructured information (documents, presentations, spreadsheets and emails) that an organization accumulates over time and is in the dark when it comes to its content, ownership and usage.

With this latest version of Data Insight, Symantec continues to integrate its storage and security offerings, providing organizations a unified approach to data governance. Data Insight 4.0 represents the progress on Symantec’s commitment to integrate solutions, making it easier for organizations to protect and manage their information.

Symantec Data Insight helps organizations improve unstructured data governance through actionable intelligence into data ownership, usage and access. Data Insight’s reporting, analytics and visualization capabilities give organizations an understanding of what data exists, how the data is used, who owns the data and who has access to the data. These insights drive efforts in efficiency and cost reduction across the data lifecycle as well as drive protection of sensitive data and compliance, resulting in reduced risk.

With Data Insight, organizations can:

  • Identify business owners of data
  • Understand what unstructured data they have to drive efficiencies and reduce cost
  • Maintain regulatory compliance for information access, use and retention
  • Ensure information is protected from exposure to unauthorized individuals

These insights will help IT organizations engage the business, drive remediation efforts and create effective information governance policies to deal with unstructured data growth.

Data Insight 4.0 integrates with Data Loss Prevention to secure high value data and with Enterprise Vault for archiving and retention to provide unified data governance. Through integration with Symantec Data Loss Prevention (DLP), Data Insight provides proactive protection of intellectual property across collaboration repositories such as file shares and SharePoint. Organizations can use Data Insight’s analytics to secure collaboration through tracking and monitoring of sensitive data usage, detecting outlier users and insider threats, and securing access to sensitive data.

Data Insight also helps fulfill compliance requirements by auditing access for confidentiality and integrity, identifying data owners and then holding them accountable for compliance on data access requirements. Organizations can also quickly discover orphan or stale data and manage archiving and retention using Symantec Enterprise Vault, or create custom actions that delete or migrate the data to reduce cost and footprint.

With Data Insight, organizations can shine the light on the black hole of unstructured dark data, helping it to provide the proper business value it should.

Learn more about Symantec Data Insight at: http://go.symantec.com/datainsight

Resources:

 

Shine A Light On Dark Data With Data Insight 4.0

$
0
0

DI2.jpgToday we announced Symantec Data Insight 4.0, the latest version of our unstructured data governance solution that provides actionable intelligence into the ownership and usage of unstructured data, such as documents, presentations, spreadsheets and emails. Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations better reduce costs, reduce risk, achieve compliance and gain insights into their unstructured data.

With this version of Data Insight, Symantec continues to integrate its storage and security offerings, providing organizations a unified approach to data governance. Data Insight 4.0 features integration with Symantec Enterprise Vault for file archiving and retention as well as enhanced integration with Symantec Data Loss Prevention for confidential data protection for file shares and SharePoint.

Over time, most organizations have accumulated large quantities of unstructured data which continues to grow rapidly, incurring rising costs and risk. Yet they are often in the dark as to what information the data contains, who owns the data and if the data has business relevance. Gartner reports that "organizations have little awareness of the volume, composition, risk and business value of their unstructured data," and further estimates that only one percent of organizations manage all their unstructured data today.[i]

New enhancements include advanced analytics, visualization, flexible query and flexible remediation capabilities that help organizations unlock broad data governance value. The benefits include:

  • Informed data management: Organizations can interactively navigate or analyze their dark data using Data Insight’s context-aware features that inform and streamline data management efforts. These include data migrations, classification, mergers and acquisitions, divestiture, tiering and growth planning. Once organizations better understand their unstructured data, they can archive the data with a Symantec Enterprise Vault connector or implement custom actions through a remediation framework.
  • Detect Insider Risk and Secure Collaboration: Data Insight offers a new Social Network Map of user activity and collaboration on data that helps organizations identify outlier or risky users to address insider threats to confidential data. Excessive access permissions are a major source of risk for unauthorized data use. 'What If' modeling and recommendations in Data Insight help organizations secure access to data without impact to information availability.
  • Streamline Regulatory and Internal Audit Compliance: Data Insight streamlines confidentiality and integrity reporting and audits for data access. A flexible query interface enables organizations to build business processes and compliance workflows. Data Insight also helps organizations streamline data retention efforts. Organizations can discover data sets by age, analyze context and content to determine retention needs, and then automate actions using Enterprise Vault or other custom actions.

Shine Light on Dark Data

Data Insight’s discovery and analysis capabilities give organizations an understanding of what data exists, how it is being used, who owns it and who has access to it. Data Insight’s actionable intelligence then enables organizations to better understand the data they have so they can take the best actions to organize, manage or protect the data. Data Insight 4.0 shines a light on dark data to improve data governance and ensure that unstructured data is a business asset.

Data Insight provides comprehensive support for leading unstructured and semi-structured platforms, such as NetApp and EMC NAS devices, Windows File Servers, Microsoft SharePoint, and Unix File Servers with the Veritas Storage Foundation file system. Data Insight provides further extensibility through a collection interface.

Learn more about Symantec Data Insight at: http://go.symantec.com/datainsight/

Resources:

 


[i] Innovation Insight: File Analysis Innovation Delivers an Understanding of Unstructured Dark Data; Published: 28 March 2013 by Alan Dayley

 


Heikoilla jäillä…

$
0
0

Eräs ystäväni soitti minulle viime viikolla (olen ystäväpiirissäni se IT‑/tietoturvatyyppi). Hän kysyi, mitä pitäisi tehdä, jos on saanut alla olevan ilmoituksen, sillä hän ei ollut nähnyt vastaavaa aikaisemmin. Kuten alla näkyy, ilmoituksessa varoitetaan, ettei kyseinen sivusto ole välttämättä enää turvallinen, koska sen SSL‑varmenne on vanhentunut.

expired-certificates.jpg

Vastasin välittömästi, ettei hänen pitäisi missään tapauksessa jatkaa eteenpäin. Jos epäilyttää, voi siirtyä toiselle sivustolle, käydä liikkeessä paikan päällä, yrittää soittaa tai lähettää yritykselle sähköpostia, mutta verkkosivustoa ei kannata käyttää. Ystäväni vastaus oli melko yllättävä: Tiedusteltuaan ongelmasta Twitterissä hän oli saanut kyseisen sivuston edustajalta neuvon, jonka mukaan ”tästä varoituksesta ei ole mitään syytä huolestua”. Pohdittuani asiaa hetken tajusin, että neuvo oli varsin kauhistuttava. Miksi luotettavalta sivustolta annettaisiin noin kummallisia ohjeita?

Syy numero 1: Sivusto ei halua menettää yhtäkään asiakasta.

Syy numero 2: Sivustolla ei ymmärretä edes perusasioita sen suhteen, kuinka kuluttajien luottamus rakentuu, mistä syystä asiakkaille annetaan vääriä neuvoja.

Syy numero 3: Sivustolla ei olla tietoisia, mitkä ovat seuraamukset, jos ihmiset noudattavat tämänkaltaisia huonoja neuvoja.

Oletin, että kysymyksessä oli syy numero kolme, joten soimasin sivuston omistajia. Sitten aloin tutkia tätä nimenomaista ongelmaa ja sivustoa tarkemmin selvittääkseni, mitä oikein oli tapahtunut. Tällä kertaa oli kyse verkkokauppasivuston ylläpitotiimin tarkkaamattomuudesta. Varmenne oli ehtinyt vanhentua huomaamatta, joten he yrittivät paikata tilannetta ja lieventää epähuomiossa sattuneen virheen vaikutuksia. Se, että asiakkaita käsketään ohittamaan varoitus, ei kuitenkaan ole minkään järkeenkäyvän parhaan käytännön mukaista. Antaisivatko he saman neuvon seuraavan kerran kun jotakuta asiakasta pyydetään sähköpostitse paljastamaan luottokorttitietonsa ja kotiosoitteensa? Toivottavasti eivät. Entäpä jos heidän sivustoonsa olisi tarttunut haittaohjelma? Tiettävästi 61 prosenttia haitallisista sivustoista on todellisuudessa aitoja verkkosivustoja, joiden tietoturva on vaarantunut tai joille on tartutettu haitallista koodia. Vuonna 2012 verkkosivustotyypeistä, jotka isännöivät haittaohjelmia, yritys‑, teknologia‑ ja ostossivustot olivat viiden yleisimmän joukossa (lähde: englanninkielinen Symantec ISTR 2013 -raportti). Jos tietokoneeni virustorjuntaohjelma havaitsisi haitallisen sivuston ja estäisi sen, kehotettaisiinko minua ohittamaan sekin varoitus ja jatkamaan vain eteenpäin?

Esimerkit edustavat ehkä ääripäätä, mutta jos käyttäjiä kehotetaan ohittamaan heidän suojakseen tarkoitetut tietoturvavaroitukset, kyseessä on huono käytäntö, eikä verkkokauppiaiden pitäisi missään tapauksessa heikentää asiakkaiden luottamusta tällä tavoin.

Minkä neuvon antaisin siis itse sekä ystävälleni että suurelle yleisölle? Valittakaa! Ja valittakaakin kunnolla. Käyttäkää live chat ‑keskustelutoimintoa, muualla verkossa julkaistua puhelinnumeroa ja sosiaalista mediaa. Laittakaa häpeämään ne ihmiset, jotka käyttävät luottamustanne hyväkseen ja saattavat teidät mahdollisesti vaaraan. Vaatikaa, että sivuston on vakuutettava teidät, jotta voitte käyttää sitä: sivustolla tulee olla näkyvissä Norton Secured Seal ‑tunnus tai muu luotettavuusmerkki, josta käyttäjät tietävät, että sivusto on tarkistettu, eikä sillä ole haittaohjelmia. Tehkää myös selväksi, ettette aio käydä kauppaa kyseisen yrityksen kanssa niin kauan kuin selaimessanne näkyy sivuston turvallisuutta tai tietoturvaa koskevia varoituksia. Kuluttajilla on paljon valtaa, ja jos valitamme ja äänestämme jaloillamme, viestimme tämänkaltaisten sivustojen omistajille pitäisi kyllä mennä perille. Toki monet meistä sulkevat epäilyttävän sivuston heti varoituksen nähtyään, mutta on myös käyttäjiä, jotka eivät vain ole varmoja, kuinka toimia, tai joita vedätetään kylmästi käskemällä ohittamaan asianmukaiset tietoturvavaroitukset tai antamalla muita huonoja neuvoja.

Jos me tällä alalla kehotamme toistuvasti käyttäjiä ohittamaan varoitukset, me saatamme aliarvioida luottamuksen ja verkkoturvallisuuden merkityksen – ja miksipä ottaisimme sen riskin, sillä verkko on täynnä mahdollisuuksia (ks. englanninkielinen blogikirjoitus).

Tietoturva‑alan toimijat tekevät parhaansa luodakseen varoituksia ja kehittääkseen suojausmenetelmiä työkaluihin, joiden avulla verkossa harjoitetaan liiketoimintaa. Kenenkään tällä alalla työskentelevän ei pitäisi ikinä neuvoa ketään ohittamaan varoituksia. Verkkokauppasivusto, joka antaa asiakkaalle huonoja neuvoja, ansaitseekin menettää kyseisen asiakkaan, sillä kun luottamus on kerran menetetty, sitä on lähes mahdoton voittaa takaisin. Ja siinä vaiheessa tappio on meidän kaikkien yhteinen.

Virtual Vision: Join the Conversation

$
0
0

SymantecVision.png

The Virtual Vision Google+ Hangout Series has been going strong for four weeks with Hangouts from NetBackup, Clearwell and Enterprise Vault and Backup Exec.

Couldn’t attend one of the previous Hangouts? Don’t worry, you can catch the recordings, view the supporting documents, or ask questions via the Google+ event pages.

Make sure to mark your calendars for the upcoming events throughout the rest of July and August. You can RSVP, view more details about the events and watch recordings after the events have taken place all on the Google+ event pages.

Check back here to see updates on the sessions, or follow @Symantec on Twitter, add +Symantec to your Google+ Circles or like us on Facebook for the latest updates.

During the events you can submit questions that will be answered in real time using the hashtag #SYMChangout via Twitter or comment on the Google+ event page.

We look forward to hanging out with you!

Date

Time

Title/Description

Google+ Event Page

6/12/2013

9:30am PST

Best Practices for VMware Protection

In this Google+ Hangout, virtualization guru George Winter (@VMXGeorge) and a panel of experts will discuss ways to get the most out of NetBackup's integration with VMware's VADP including vCloud Director integration and vSphere 5.1.

Details

6/19/2013

9:30am PST

Defensible Deletion: Cut the Clutter - What You Have, What You Need, and What You Can Safely Get Rid Of

Simple Facts-  Information is growing at alarming rates, Organizations fear the consequences of eliminating even the most trivial data and these fears have been heightened by the retention requirements of Dodd-Frank, FINRA 10-06 and other troubling laws and regulations.  In this hangout learn how to identify the data  that you need to collect and manage versus the data that you can safely get rid of.  In addition, attendees can understand how to limit exposure and storage costs by implementing a defensible deletion plan for both active and archived content.  

Details

6/26/2013

10:00am PST

Is Big Data TOO BIG to Backup? 

What is Big Data? How much of it do you need to protect? Can you even back it up? This Google+ Hangout will feature a panel of experts who will show you how the NetBackup platform can help you protect your big data. A special focus will be given to protecting In-Memory Databases, the newest addition to the NetBackup portfolio. NetBackup is the first and only backup vendor certified by SAP to protect HANA database. Fully integrated through the SAP backint interface, it provides a quick and easy setup for DBAs to protect HANA databases through familiar tools while seamlessly plugged into the corporate NetBackup environment.

Details

7/10/2013

9:30am PST

Backup Exec: Virtualization Experts talk Best Practices for Virtual Backups

In today’s business environment IT Professionals need to adapt to changes and opportunities faster than ever.  Increasingly so, they rely on their data to run their business functions.  The loss of access to that data would not only cripple, but could ruin a company.  More IT Pros are interested in virtualization as a way to improve business efficiency, but have legitimate hesitation due to concerns about its impact on the speed of access and recoverability they have to their data. 

Today’s landscape is littered with niche products for protecting virtual machines and their data, but Symantec Backup Exec delivers a unified solution for backup and recovery of virtual environments.  It protects virtual and physical servers and data with industry leading granular recovery.  Join virtualization experts from Symantec, Task Force Tips and NAC Solutions as we answer your questions and discuss best practices for transitioning to virtual environments and protecting your virtual data.

Details

7/17/2013

9:30am PST

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBackup Appliances & Beyond (Onsite/Offsite)

In this technical session we will share a few customer-tested blueprints for implementing DR strategies with NetBackup appliances showing support for onsite and offsite disaster recovery.  This includes the architecture design with Symantec best practices, down to execution of the wizards and command lines needed to implement the solution.  In addition, we discuss how to use OpsCenter as a Swiss army tool to benchmark and enhance the appliance’s DR experience.

Details

7/24/2013

9:30am PST

Managing Dark Data and File Governance

With the rapid growth of unstructured, or dark data, organizations face increasing risk of inappropriate data access as well as rising compliance and storage costs. Symantec Data Insight enables organizations to improve data governance through visibility into usage and ownership of dark data. In this session, preview how Data Insight, through actionable analytics and visualization techniques, helps organizations reduce risks, decrease costs and provide intelligence for business decisions.

Details

7/31/2013

9:30am PST

The New Era of Business Continuity

Business Continuity is more than protecting sprawling data, meeting Service Level Agreements, and stopping security threats. Continuity must be maintained while embracing virtualization, cloud and other new technologies. Disruption looms on all sides: security threats, configuration errors, power outages, natural disasters, and technology upgrades. Learn about best practices and technologies for protecting your data wherever it resides and keeping applications highly available, resulting in a complete business continuity strategy.

 

8/7/2013

9:30am PST

BONUS SESSION: Backing up vCloud Director | What's the difference between the vCD API and VADP?

Is your data protection solution vCloud Director AWARE?  The introduction of VMware's vCloud Director included a new IaaS offering that layers on top of the existing vSphere product suite.  This means yet additional challenges for backup and recovery professionals to work around. In this Google+ Hangout we’ll discuss these challenges and show you how we solve them in one of the largest vCloud Director deployments in the world. 

 

 

Details

8/14/2013

9:30am PST

What Can the Backup Exec 3600 do to Improve your Data Protection Strategy?

The Backup Exec 3600 Appliance mitigates the problems of complexity, cost, and risk associated with traditional backup solutions by delivering a combined hardware and software solution in a single package.

This Google+ Hangout is intended to assist partners, service providers and end-users as they design and implement a data protection strategy. Building a traditional backup solution can result in a high level of complexity. Our experts will discuss the turnkey advantages of the BE 3600 Appliance.  It provides a Backup Server, 5.5TB of back end storage as well as “all-you-can-eat” Backup Exec 2012 Agents and Options, including the Deduplication Option, all in one pre-configured box. 

Join our Hangout along with members of Product Management and Engineering.  We will take a good hard look at the Backup Exec 3600 and answer your questions about the technology, implementation and best practices.

Details

8/21/2013

9:30am PST

Why Host-Based SSDs are Critical for SLAs in Mission-Critical Datacenters

In this session, learn about the growing reliance on Solid State Drives to optimize storage environments, discuss the benefits and risks, and examine best practices.

 

8/28/2013

9:30am PST

Less Work, More Flow: Revolutionizing Governance and eDiscovery Workflow

eDiscovery vendors have promised streamlined workflows across the information management lifecycle for years.  Ultimately, these promises have failed to materialize because individual point solutions cannot be automated to operate seamlessly within a broader information governance framework.  Enter Symantec.  During this Google+ Hangout, we will explore how the integration of Enterprise Vault and the Clearwell eDiscovery Platform is rocketing users into the next generation of eDiscovery workflow.

 

9/4/2013

9:30am PST

On Prem vs. Cloud Archiving

Description forthcoming...

 

 

 

Virtual Vision: Join the Conversation

$
0
0

SymantecVision.png

The Virtual Vision Google+ Hangout Series has been going strong for four weeks with Hangouts from NetBackup, Clearwell and Enterprise Vault and Backup Exec.

Couldn’t attend one of the previous Hangouts? Don’t worry, you can catch the recordings, view the supporting documents, or ask questions via the Google+ event pages.

Make sure to mark your calendars for the upcoming events throughout the rest of July and August. You can RSVP, view more details about the events and watch recordings after the events have taken place all on the Google+ event pages.

Check back here to see updates on the sessions, or follow @Symantec on Twitter, add +Symantec to your Google+ Circles or like us on Facebook for the latest updates.

During the events you can submit questions that will be answered in real time using the hashtag #SYMChangout via Twitter or comment on the Google+ event page.

We look forward to hanging out with you!

Date

Time

Title/Description

Google+ Event Page

6/12/2013

9:30am PST

Best Practices for VMware Protection

In this Google+ Hangout, virtualization guru George Winter (@VMXGeorge) and a panel of experts will discuss ways to get the most out of NetBackup's integration with VMware's VADP including vCloud Director integration and vSphere 5.1.

Details

6/19/2013

9:30am PST

Defensible Deletion: Cut the Clutter - What You Have, What You Need, and What You Can Safely Get Rid Of

Simple Facts-  Information is growing at alarming rates, Organizations fear the consequences of eliminating even the most trivial data and these fears have been heightened by the retention requirements of Dodd-Frank, FINRA 10-06 and other troubling laws and regulations.  In this hangout learn how to identify the data  that you need to collect and manage versus the data that you can safely get rid of.  In addition, attendees can understand how to limit exposure and storage costs by implementing a defensible deletion plan for both active and archived content.  

Details

6/26/2013

10:00am PST

Is Big Data TOO BIG to Backup? 

What is Big Data? How much of it do you need to protect? Can you even back it up? This Google+ Hangout will feature a panel of experts who will show you how the NetBackup platform can help you protect your big data. A special focus will be given to protecting In-Memory Databases, the newest addition to the NetBackup portfolio. NetBackup is the first and only backup vendor certified by SAP to protect HANA database. Fully integrated through the SAP backint interface, it provides a quick and easy setup for DBAs to protect HANA databases through familiar tools while seamlessly plugged into the corporate NetBackup environment.

Details

7/10/2013

9:30am PST

Backup Exec: Virtualization Experts talk Best Practices for Virtual Backups

In today’s business environment IT Professionals need to adapt to changes and opportunities faster than ever.  Increasingly so, they rely on their data to run their business functions.  The loss of access to that data would not only cripple, but could ruin a company.  More IT Pros are interested in virtualization as a way to improve business efficiency, but have legitimate hesitation due to concerns about its impact on the speed of access and recoverability they have to their data. 

Today’s landscape is littered with niche products for protecting virtual machines and their data, but Symantec Backup Exec delivers a unified solution for backup and recovery of virtual environments.  It protects virtual and physical servers and data with industry leading granular recovery.  Join virtualization experts from Symantec, Task Force Tips and NAC Solutions as we answer your questions and discuss best practices for transitioning to virtual environments and protecting your virtual data.

Details

7/17/2013

9:30am PST

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBackup Appliances & Beyond (Onsite/Offsite)

In this technical session we will share a few customer-tested blueprints for implementing DR strategies with NetBackup appliances showing support for onsite and offsite disaster recovery.  This includes the architecture design with Symantec best practices, down to execution of the wizards and command lines needed to implement the solution.  In addition, we discuss how to use OpsCenter as a Swiss army tool to benchmark and enhance the appliance’s DR experience.

Details

7/24/2013

9:30am PST

Managing Dark Data and File Governance

With the rapid growth of unstructured, or dark data, organizations face increasing risk of inappropriate data access as well as rising compliance and storage costs. Symantec Data Insight enables organizations to improve data governance through visibility into usage and ownership of dark data. In this session, preview how Data Insight, through actionable analytics and visualization techniques, helps organizations reduce risks, decrease costs and provide intelligence for business decisions.

Details

7/31/2013

9:30am PST

The New Era of Business Continuity

Business Continuity is more than protecting sprawling data, meeting Service Level Agreements, and stopping security threats. Continuity must be maintained while embracing virtualization, cloud and other new technologies. Disruption looms on all sides: security threats, configuration errors, power outages, natural disasters, and technology upgrades. Learn about best practices and technologies for protecting your data wherever it resides and keeping applications highly available, resulting in a complete business continuity strategy.

 

8/7/2013

9:30am PST

BONUS SESSION: Backing up vCloud Director | What's the difference between the vCD API and VADP?

Is your data protection solution vCloud Director AWARE?  The introduction of VMware's vCloud Director included a new IaaS offering that layers on top of the existing vSphere product suite.  This means yet additional challenges for backup and recovery professionals to work around. In this Google+ Hangout we’ll discuss these challenges and show you how we solve them in one of the largest vCloud Director deployments in the world. 

 

 

Details

8/14/2013

9:30am PST

What Can the Backup Exec 3600 do to Improve your Data Protection Strategy?

The Backup Exec 3600 Appliance mitigates the problems of complexity, cost, and risk associated with traditional backup solutions by delivering a combined hardware and software solution in a single package.

This Google+ Hangout is intended to assist partners, service providers and end-users as they design and implement a data protection strategy. Building a traditional backup solution can result in a high level of complexity. Our experts will discuss the turnkey advantages of the BE 3600 Appliance.  It provides a Backup Server, 5.5TB of back end storage as well as “all-you-can-eat” Backup Exec 2012 Agents and Options, including the Deduplication Option, all in one pre-configured box. 

Join our Hangout along with members of Product Management and Engineering.  We will take a good hard look at the Backup Exec 3600 and answer your questions about the technology, implementation and best practices.

Details

8/21/2013

9:30am PST

Why Host-Based SSDs are Critical for SLAs in Mission-Critical Datacenters

In this session, learn about the growing reliance on Solid State Drives to optimize storage environments, discuss the benefits and risks, and examine best practices.

 

8/28/2013

9:30am PST

Less Work, More Flow: Revolutionizing Governance and eDiscovery Workflow

eDiscovery vendors have promised streamlined workflows across the information management lifecycle for years.  Ultimately, these promises have failed to materialize because individual point solutions cannot be automated to operate seamlessly within a broader information governance framework.  Enter Symantec.  During this Google+ Hangout, we will explore how the integration of Enterprise Vault and the Clearwell eDiscovery Platform is rocketing users into the next generation of eDiscovery workflow.

 

9/4/2013

9:30am PST

On Prem vs. Cloud Archiving

Description forthcoming...

 

 

 

Virtual Vision: Join the Conversation

$
0
0

SymantecVision.png

The Virtual Vision Google+ Hangout Series has been going strong for four weeks with Hangouts from NetBackup, Clearwell and Enterprise Vault and Backup Exec.

Couldn’t attend one of the previous Hangouts? Don’t worry, you can catch the recordings, view the supporting documents, or ask questions via the Google+ event pages.

Make sure to mark your calendars for the upcoming events throughout the rest of July and August. You can RSVP, view more details about the events and watch recordings after the events have taken place all on the Google+ event pages.

Check back here to see updates on the sessions, or follow @Symantec on Twitter, add +Symantec to your Google+ Circles or like us on Facebook for the latest updates.

During the events you can submit questions that will be answered in real time using the hashtag #SYMChangout via Twitter or comment on the Google+ event page.

We look forward to hanging out with you!

Date

Time

Title/Description

Google+ Event Page

6/12/2013

9:30am PST

Best Practices for VMware Protection

In this Google+ Hangout, virtualization guru George Winter (@VMXGeorge) and a panel of experts will discuss ways to get the most out of NetBackup's integration with VMware's VADP including vCloud Director integration and vSphere 5.1.

Details

6/19/2013

9:30am PST

Defensible Deletion: Cut the Clutter - What You Have, What You Need, and What You Can Safely Get Rid Of

Simple Facts-  Information is growing at alarming rates, Organizations fear the consequences of eliminating even the most trivial data and these fears have been heightened by the retention requirements of Dodd-Frank, FINRA 10-06 and other troubling laws and regulations.  In this hangout learn how to identify the data  that you need to collect and manage versus the data that you can safely get rid of.  In addition, attendees can understand how to limit exposure and storage costs by implementing a defensible deletion plan for both active and archived content.  

Details

6/26/2013

10:00am PST

Is Big Data TOO BIG to Backup? 

What is Big Data? How much of it do you need to protect? Can you even back it up? This Google+ Hangout will feature a panel of experts who will show you how the NetBackup platform can help you protect your big data. A special focus will be given to protecting In-Memory Databases, the newest addition to the NetBackup portfolio. NetBackup is the first and only backup vendor certified by SAP to protect HANA database. Fully integrated through the SAP backint interface, it provides a quick and easy setup for DBAs to protect HANA databases through familiar tools while seamlessly plugged into the corporate NetBackup environment.

Details

7/10/2013

9:30am PST

Backup Exec: Virtualization Experts talk Best Practices for Virtual Backups

In today’s business environment IT Professionals need to adapt to changes and opportunities faster than ever.  Increasingly so, they rely on their data to run their business functions.  The loss of access to that data would not only cripple, but could ruin a company.  More IT Pros are interested in virtualization as a way to improve business efficiency, but have legitimate hesitation due to concerns about its impact on the speed of access and recoverability they have to their data. 

Today’s landscape is littered with niche products for protecting virtual machines and their data, but Symantec Backup Exec delivers a unified solution for backup and recovery of virtual environments.  It protects virtual and physical servers and data with industry leading granular recovery.  Join virtualization experts from Symantec, Task Force Tips and NAC Solutions as we answer your questions and discuss best practices for transitioning to virtual environments and protecting your virtual data.

Details

7/17/2013

9:30am PST

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBackup Appliances & Beyond (Onsite/Offsite)

In this technical session we will share a few customer-tested blueprints for implementing DR strategies with NetBackup appliances showing support for onsite and offsite disaster recovery.  This includes the architecture design with Symantec best practices, down to execution of the wizards and command lines needed to implement the solution.  In addition, we discuss how to use OpsCenter as a Swiss army tool to benchmark and enhance the appliance’s DR experience.

Details

7/24/2013

9:30am PST

Managing Dark Data and File Governance

With the rapid growth of unstructured, or dark data, organizations face increasing risk of inappropriate data access as well as rising compliance and storage costs. Symantec Data Insight enables organizations to improve data governance through visibility into usage and ownership of dark data. In this session, preview how Data Insight, through actionable analytics and visualization techniques, helps organizations reduce risks, decrease costs and provide intelligence for business decisions.

Details

7/31/2013

9:30am PST

The New Era of Business Continuity

Business Continuity is more than protecting sprawling data, meeting Service Level Agreements, and stopping security threats. Continuity must be maintained while embracing virtualization, cloud and other new technologies. Disruption looms on all sides: security threats, configuration errors, power outages, natural disasters, and technology upgrades. Learn about best practices and technologies for protecting your data wherever it resides and keeping applications highly available, resulting in a complete business continuity strategy.

 

8/7/2013

9:30am PST

BONUS SESSION: Backing up vCloud Director | What's the difference between the vCD API and VADP?

Is your data protection solution vCloud Director AWARE?  The introduction of VMware's vCloud Director included a new IaaS offering that layers on top of the existing vSphere product suite.  This means yet additional challenges for backup and recovery professionals to work around. In this Google+ Hangout we’ll discuss these challenges and show you how we solve them in one of the largest vCloud Director deployments in the world. 

 

 

Details

8/14/2013

9:30am PST

What Can the Backup Exec 3600 do to Improve your Data Protection Strategy?

The Backup Exec 3600 Appliance mitigates the problems of complexity, cost, and risk associated with traditional backup solutions by delivering a combined hardware and software solution in a single package.

This Google+ Hangout is intended to assist partners, service providers and end-users as they design and implement a data protection strategy. Building a traditional backup solution can result in a high level of complexity. Our experts will discuss the turnkey advantages of the BE 3600 Appliance.  It provides a Backup Server, 5.5TB of back end storage as well as “all-you-can-eat” Backup Exec 2012 Agents and Options, including the Deduplication Option, all in one pre-configured box. 

Join our Hangout along with members of Product Management and Engineering.  We will take a good hard look at the Backup Exec 3600 and answer your questions about the technology, implementation and best practices.

Details

8/21/2013

9:30am PST

Why Host-Based SSDs are Critical for SLAs in Mission-Critical Datacenters

In this session, learn about the growing reliance on Solid State Drives to optimize storage environments, discuss the benefits and risks, and examine best practices.

 

8/28/2013

9:30am PST

Less Work, More Flow: Revolutionizing Governance and eDiscovery Workflow

eDiscovery vendors have promised streamlined workflows across the information management lifecycle for years.  Ultimately, these promises have failed to materialize because individual point solutions cannot be automated to operate seamlessly within a broader information governance framework.  Enter Symantec.  During this Google+ Hangout, we will explore how the integration of Enterprise Vault and the Clearwell eDiscovery Platform is rocketing users into the next generation of eDiscovery workflow.

 

9/4/2013

9:30am PST

On Prem vs. Cloud Archiving

Description forthcoming...

 

 

 

Virtual Vision: Join the Conversation

$
0
0

SymantecVision.png

The Virtual Vision Google+ Hangout Series has been going strong for four weeks with Hangouts from NetBackup, Clearwell and Enterprise Vault and Backup Exec.

Couldn’t attend one of the previous Hangouts? Don’t worry, you can catch the recordings, view the supporting documents, or ask questions via the Google+ event pages.

Make sure to mark your calendars for the upcoming events throughout the rest of July and August. You can RSVP, view more details about the events and watch recordings after the events have taken place all on the Google+ event pages.

Check back here to see updates on the sessions, or follow @Symantec on Twitter, add +Symantec to your Google+ Circles or like us on Facebook for the latest updates.

During the events you can submit questions that will be answered in real time using the hashtag #SYMChangout via Twitter or comment on the Google+ event page.

We look forward to hanging out with you!

Date

Time

Title/Description

Google+ Event Page

6/12/2013

9:30am PST

Best Practices for VMware Protection

In this Google+ Hangout, virtualization guru George Winter (@VMXGeorge) and a panel of experts will discuss ways to get the most out of NetBackup's integration with VMware's VADP including vCloud Director integration and vSphere 5.1.

Details

6/19/2013

9:30am PST

Defensible Deletion: Cut the Clutter - What You Have, What You Need, and What You Can Safely Get Rid Of

Simple Facts-  Information is growing at alarming rates, Organizations fear the consequences of eliminating even the most trivial data and these fears have been heightened by the retention requirements of Dodd-Frank, FINRA 10-06 and other troubling laws and regulations.  In this hangout learn how to identify the data  that you need to collect and manage versus the data that you can safely get rid of.  In addition, attendees can understand how to limit exposure and storage costs by implementing a defensible deletion plan for both active and archived content.  

Details

6/26/2013

10:00am PST

Is Big Data TOO BIG to Backup? 

What is Big Data? How much of it do you need to protect? Can you even back it up? This Google+ Hangout will feature a panel of experts who will show you how the NetBackup platform can help you protect your big data. A special focus will be given to protecting In-Memory Databases, the newest addition to the NetBackup portfolio. NetBackup is the first and only backup vendor certified by SAP to protect HANA database. Fully integrated through the SAP backint interface, it provides a quick and easy setup for DBAs to protect HANA databases through familiar tools while seamlessly plugged into the corporate NetBackup environment.

Details

7/10/2013

9:30am PST

Backup Exec: Virtualization Experts talk Best Practices for Virtual Backups

In today’s business environment IT Professionals need to adapt to changes and opportunities faster than ever.  Increasingly so, they rely on their data to run their business functions.  The loss of access to that data would not only cripple, but could ruin a company.  More IT Pros are interested in virtualization as a way to improve business efficiency, but have legitimate hesitation due to concerns about its impact on the speed of access and recoverability they have to their data. 

Today’s landscape is littered with niche products for protecting virtual machines and their data, but Symantec Backup Exec delivers a unified solution for backup and recovery of virtual environments.  It protects virtual and physical servers and data with industry leading granular recovery.  Join virtualization experts from Symantec, Task Force Tips and NAC Solutions as we answer your questions and discuss best practices for transitioning to virtual environments and protecting your virtual data.

Details

7/17/2013

9:30am PST

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBackup Appliances & Beyond (Onsite/Offsite)

In this technical session we will share a few customer-tested blueprints for implementing DR strategies with NetBackup appliances showing support for onsite and offsite disaster recovery.  This includes the architecture design with Symantec best practices, down to execution of the wizards and command lines needed to implement the solution.  In addition, we discuss how to use OpsCenter as a Swiss army tool to benchmark and enhance the appliance’s DR experience.

Details

7/24/2013

9:30am PST

Managing Dark Data and File Governance

With the rapid growth of unstructured, or dark data, organizations face increasing risk of inappropriate data access as well as rising compliance and storage costs. Symantec Data Insight enables organizations to improve data governance through visibility into usage and ownership of dark data. In this session, preview how Data Insight, through actionable analytics and visualization techniques, helps organizations reduce risks, decrease costs and provide intelligence for business decisions.

Details

7/31/2013

9:30am PST

The New Era of Business Continuity

Business Continuity is more than protecting sprawling data, meeting Service Level Agreements, and stopping security threats. Continuity must be maintained while embracing virtualization, cloud and other new technologies. Disruption looms on all sides: security threats, configuration errors, power outages, natural disasters, and technology upgrades. Learn about best practices and technologies for protecting your data wherever it resides and keeping applications highly available, resulting in a complete business continuity strategy.

 

8/7/2013

9:30am PST

BONUS SESSION: Backing up vCloud Director | What's the difference between the vCD API and VADP?

Is your data protection solution vCloud Director AWARE?  The introduction of VMware's vCloud Director included a new IaaS offering that layers on top of the existing vSphere product suite.  This means yet additional challenges for backup and recovery professionals to work around. In this Google+ Hangout we’ll discuss these challenges and show you how we solve them in one of the largest vCloud Director deployments in the world. 

 

 

Details

8/14/2013

9:30am PST

What Can the Backup Exec 3600 do to Improve your Data Protection Strategy?

The Backup Exec 3600 Appliance mitigates the problems of complexity, cost, and risk associated with traditional backup solutions by delivering a combined hardware and software solution in a single package.

This Google+ Hangout is intended to assist partners, service providers and end-users as they design and implement a data protection strategy. Building a traditional backup solution can result in a high level of complexity. Our experts will discuss the turnkey advantages of the BE 3600 Appliance.  It provides a Backup Server, 5.5TB of back end storage as well as “all-you-can-eat” Backup Exec 2012 Agents and Options, including the Deduplication Option, all in one pre-configured box. 

Join our Hangout along with members of Product Management and Engineering.  We will take a good hard look at the Backup Exec 3600 and answer your questions about the technology, implementation and best practices.

Details

8/21/2013

9:30am PST

Why Host-Based SSDs are Critical for SLAs in Mission-Critical Datacenters

In this session, learn about the growing reliance on Solid State Drives to optimize storage environments, discuss the benefits and risks, and examine best practices.

 

8/28/2013

9:30am PST

Less Work, More Flow: Revolutionizing Governance and eDiscovery Workflow

eDiscovery vendors have promised streamlined workflows across the information management lifecycle for years.  Ultimately, these promises have failed to materialize because individual point solutions cannot be automated to operate seamlessly within a broader information governance framework.  Enter Symantec.  During this Google+ Hangout, we will explore how the integration of Enterprise Vault and the Clearwell eDiscovery Platform is rocketing users into the next generation of eDiscovery workflow.

 

9/4/2013

9:30am PST

On Prem vs. Cloud Archiving

Description forthcoming...

 

 

 

Viewing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>