Symantec 2003 Annual Report Download - page 17

Download and view the complete annual report

Please find page 17 of the 2003 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 76

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

Symantec 2003 15
Managing the Information
The sheer volume of information that security products generate
throughout a network complicates today’s security environment. In order
to maintain effective security, this information must be managed and
used to take timely action. Companies must have a way to correlate it,
simplify it, and set priorities for their limited resources.
In an average-sized company, firewall and intrusion detection
devices can generate more than nine million log entries and alerts each
month. Yet an average-sized IT department lacks the manpower to evalu-
ate each of those events to determine the 50 or so that might constitute
a real security threat—or the few that actually require immediate action.
With the introduction of the Symantec™ Security Management
System, Symantec has established the standard for security management
across the enterprise. By embracing a multi-vendor approach and an
open, standards-based architecture, the system leverages our full secu-
rity expertise, partner network, and breadth of technologies and services
to simplify our customers’ enterprise security.
We help our customers collect and consolidate data from Symantec
and third-party protection solutions to maintain a comprehensive view of
all security events across their enterprise. Symantec technology corre-
lates and prioritizes this data to help customers identify and respond
quickly to security breaches.
Symantec technologies also manage enterprise-wide security policy
compliance, automate the discovery of policy deviations and vulnerabili-
ties, conduct security assessments, and deliver an integrated report for
the entire enterprise.
Competent security management requires highly skilled people and
around-the-clock coverage. Not all customers have the resources to
deploy such a thorough system in-house. Symantec has developed a
global network of Security Operations Centers and management consult-
ants to serve customers that prefer to outsource the monitoring and
management of their security infrastructure. Symantec’s Security
Operations Centers in the United States, the United Kingdom, Germany,
and Australia are configured to ensure confidential and highly effective
environments for users, connecting to customers’ in-house emergency
teams through a host of real-time and secure communication vehicles.