Symantec 2002 Annual Report Download - page 14

Download and view the complete annual report

Please find page 14 of the 2002 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109

16 NEW GAME
Symantecs security management system will give information security profession-
als and IT executives a total view of their security infrastructure. It will provide a com-
prehensive response plan for managing outbreaks by prioritizing threats and offering
response techniques. Through event management consolidation and incident manage-
ment workflow, it will be able to reduce to essentials the amount of data reported to
the administrator, allowing security outbreaks to be resolved quickly. It will sort false
positives from real threats and correlate high volumes of alert information in real time
to automate the detection and analysis of security incidents.
Symantecs security management system will collect data from a variety of third-
party security applications and relay it to third-party network management applica-
tions, using its unique architecture, built on industry standards. Symantec contributes
to the ongoing evolution of these standards.
Integrated enterprise security becomes a risk management tool that allows enter-
prises to balance protection, performance and cost associated with growing a business
in a connected world. In order to minimize the complexities that tax administrators
and managers, IT departments are moving toward fewer vendors and fewer products,
demanding more integrated and complete solutions from their IT suppliers.
The bottom line? Our customers protect the investment theyve made in their
infrastructure and reduce total cost of ownership.
the best defense: a dynamic offense
The first line of defense against cyber attack is the security technology deployed
throughout a network. But that defense must be backed by ongoing, offensive counter-
measures providing proactive intelligence to prevent an outbreak before it happens.
SymantecSecurity Response brings together one of the worlds largest and most
experienced teams of dedicated intrusion experts, security engineers, virus hunters
and global technical support teams. The group works together to provide global, 24/7
coverage to help protect business continuity and reduce downtime for enterprises and
individuals around the world.
automation ensures rapid response Symantecs automated response system handles
more than 150,000 submissions a month. Any potential threats submitted to Symantec
are rapidly turned around with comprehensive preventive measures that can be
fig. 03 SECURITY COUNTERMEASURESSymantec Security Response provides proactive intelligence around the clock.
24 /7