News Release: New McAfee Database Security Solution Offers Businesses of all Sizes Complete Threat Protection

New McAfee Database Security Solution Offers Businesses of all Sizes
Complete Threat Protection

Features New Protection for Teradata Databases, Free Database Audit
Plug-in for MySQL and Ability to Manage Database Security Outside of its
Own Silo

RSA Conference, San Francisco - Feb. 28, 2012 - McAfee today announced
its new McAfee Database Activity Monitoring solution offering reliable,
real-time protection for business-critical databases. The solution
enables organizations to achieve much greater security management
efficiency through its incorporation into the McAfee ePolicy
Orchestrator centralized security management platform.
According to a 2010 Verizon Business Study, more than 90 per cent of
records breached involved a database, with more than 87 per cent
resulting from exploits requiring significant technical skills. The
McAfee database security solution protects databases from external,
internal and intra-database threats, requiring no architecture changes
or costly downtime. The latest version of McAfee Database Activity
Monitoring now supports MySQL and Teradata databases, in an effort to
ensure complete protection across the most popular database management
systems.

“Teradata worked closely with McAfee to enable its support of
Teradata in the new release of McAfee Database Activity Monitoring,”
said Jim Browning, Enterprise Security Architect for Teradata Labs.
“Companies using McAfee can now realize the power of Teradata,
while better monitoring user activity and enhancing the protection of
highly sensitive data.”

McAfee now enables organizations to easily incorporate database
security into their overall security program and realize tremendous
management efficiencies with the full integration of McAfee
Vulnerability Manager for Databases into the McAfee ePolicy Orchestrator
console.

“Typically, three out of four organizations rely solely on the native
database security features provided by their database vendor,” said
Slavik Markovich, chief technology officer of database security at
McAfee.  “Organizations of all types and sizes that possess sensitive
and valuable database information, such as credit card information,
patient records and corporate financial data, are vulnerable to breaches
which can be perpetrated by outside hackers or privileged insiders.”

McAfee’s unique approach to database security circumvents the major
challenges that prevent most organizations from properly protecting
their databases, by offering key features such as:

● Complete visibility into databases’ vulnerabilities: total
insight into the existence, data sensitivity and security posture of
each and every database in the environment
● Non-intrusive, real-time protection across all threat vectors:
requires no changes to existing database and network architecture, as
non-intrusive memory-based sensors offer reliable protection for
databases from malicious or unauthorized activity across all threat
vectors
● Compliance without downtime: through McAfee virtual patching for
databases, security updates can be made without the business disruption
of taking critical applications offline

For more information about McAfee Database Security and to watch a
video, visit
http://www.mcafee.com/us/products/database-security/index.aspx.

About McAfee
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC),
is the world's largest dedicated security technology company. McAfee
delivers proactive and proven solutions and services that help secure
systems, networks, and mobile devices around the world, allowing users
to safely connect to the Internet, browse and shop the Web more
securely. Backed by its unrivaled Global Threat Intelligence, McAfee
creates innovative products that empower home users, businesses, the
public sector and service providers by enabling them to prove compliance
with regulations, protect data, prevent disruptions, ident
ify
vulnerabilities, and continuously monitor and improve their security.
McAfee is relentlessly focused on constantly finding new ways to keep
our customers safe. http://www.mcafee.com

McAfee Canada is headquartered in Markham, Ontario, with regional
offices across Canada. The company's Consumer Software Research and
Development facility in based in Waterloo, Ontario.


Integrated Carrier Billing Gains Momentum on BlackBerry App World

Integrated Carrier Billing Gains Momentum on BlackBerry App World

BARCELONA, SPAIN--(Marketwire - Feb. 27, 2012) - Mobile World Congress - Research In Motion (NASDAQ:RIMM)(TSX:RIM) today announced that more than 40 carriers around the world have now deployed integrated carrier billing for their customers on BlackBerry App World(TM).

Carriers offering integrated billing on BlackBerry App World include:

-- A1 Telekom (Austria)
-- AT&T (United States)
-- Bell (Canada)
-- Digicel (25 markets in the Caribbean and Latin America)
-- Indosat (Indonesia)
-- Rogers Wireless (Canada)
-- SFR (France)
-- Telefonica (UK)
-- T-Mobile (United States)
-- Telus (Canada)
-- Telstra (Australia)
-- Vodafone (Spain, Greece, Italy, Ireland, Portugal, United Kingdom &
Netherlands)

BlackBerry App World is now available in 164 markets and territories worldwide. More than 60,000 apps are currently available on RIM's app store and over 174 million apps are downloaded each month. Over two billion apps have been downloaded to date.

The deployment of integrated carrier billing is an example of RIM's ongoing commitment to work together strategically with its carrier partners and it has proven to drive significant value for the whole mobile ecosystem, including carriers, developers, content providers and customers. Integrated carrier billing enables a user to purchase apps or digital goods (such as the additional chapters of an e-book or additional levels of a computer game) without interrupting the user's app experience. They can simply charge the purchase to their regular monthly bill, and both one-off and recurring (subscription-based) purchases are supported.

Data suggests that customers' propensity to purchase apps on BlackBerry App World increases when carrier billing is offered. After implementing carrier billing on BlackBerry App World, carriers on average experienced a 120% increase in BlackBerry app purchases by their customers, with 65-70% of their customers' purchases being transacted through the carrier.

Dario Talmesio, Principal Analyst, Informa Telecoms & Media, said: "There are clear business benefits for mobile operators when implementing carrier billing, since it enables them to build upon existing billing relationships with customers. RIM has always adopted a strategy of working constructively with operators. It follows therefore that implementing carrier billing through BlackBerry App World represents a rich opportunity for carriers."

Ronjon Nag, Vice President, App World & Intelligent Systems at RIM, said, "We're delighted that many of our carrier partners around the world have recognised the value that integrated billing provides, by making it easy and convenient for customers to purchase BlackBerry apps. RIM remains committed to continued innovation in the way we align with our partners in order to best serve customers while providing a profitable platform for the whole mobile ecosystem."

About Research In Motion - Research In Motion (RIM), a global leader in wireless innovation, revolutionised the mobile industry with the introduction of the BlackBerry(R) solution in 1999. Today, BlackBerry products and services are used by millions of customers around the world to stay connected to the people and content that matter most throughout their day. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe, Asia Pacific and Latin America. RIM is listed on the NASDAQ Stock Market (NASDAQ:RIMM) and the Toronto Stock Exchange (TSX:RIM). For more information, visit www.rim.com or www.blackberry.com.

Forward-looking statements in this news release are made pursuant to the "safe harbor" provisions of the U.S. Private Securities Litigation Reform Act of 1995 and applicable Canadian securities laws. When used herein, words such as "expect", "anticipate", "estimate", "may", "will", "should", "intend," "believe", and similar expressions, are intended to identify forward-looking statements. Forward-looking statements are based on estimates and assumptions made by RIM in light of its experience and its perception of historical trends, current conditions and expected future developments, as well as other factors that RIM believes are appropriate in the circumstances. Many factors could cause RIM's actual results, performance or achievements to differ materially from those expressed or implied by the forward-looking statements, including those described in the "Risk Factors" section of RIM's Annual Information Form, which is included in its Annual Report on Form 40-F (copies of which filings may be obtained at www.sedar.com or www.sec.gov). These factors should be considered carefully, and readers should not place undue reliance on RIM's forward-looking statements. RIM has no intention and undertakes no obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise, except as required by law.

The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks of Research In Motion Limited. RIM, Research In Motion and BlackBerry are registered with the U.S. Patent and Trademark Office and may be pending or registered in other countries. All other brands, product names, company names, trademarks and service marks are the properties of their respective owners. RIM assumes no obligations or liability and makes no representation, warranty, endorsement or guarantee in relation to any aspect of any third party products or services.

Cyber Risk Still Not Getting Adequate Attention from Boards and Senior Executives

New Research Reveals Cyber Risk Still Not Getting Adequate Attention
from Boards and Senior Executives

News Summary:

* RSA®, The Security Division of EMC, alongside Carnegie Mellon CyLab
highlight new global research on cyber security governance
* New research surveyed Forbes Global 2000 list of CEOs, CFOs,
CROs and
board members of governance practices

Full Story:

RSA CONFERENCE 2012 - SAN FRANCISCO, CA - February 27, 2012 - The
advanced findings from the latest 2012 Carnegie Mellon CyLab Governance
survey of how corporate boards and executives are managing cyber risks
reveals the issue is still not getting adequate attention at the top.
The survey, sponsored by RSA, The Security Division of EMC (NYSE: EMC),
was the third survey conducted by CyLab Adjunct Distinguished Fellow,
Jody Westby, and comparisons with the 2008 and 2010 data clearly show
ongoing gaps in governance.

Using the Forbes Global 2000 list, the 2012 survey represents the first
analysis of cyber governance postures of major corporations around the
world. One of the most important advance findings is that boards and
senior management still are not engaging in key oversight activities,
such as setting top-level policies and reviews of privacy and security
budgets to help protect against breaches and mitigate financial losses.
Even though there are some improvements in key “regular” board
governance practices, less than one-third of the respondents indicate
their boards and senior executives are undertaking basic
responsibilities for cyber governance.

Although improvements are shown in the formation of board Risk
Committees and cross-organizational teams within their organizations,
nearly half of the respondents indicated that their companies do not
have full-time personnel in key privacy and security roles, and 58 per
cent of the respondents said their boards are not reviewing their
companies’ insurance coverage for cyber-related risks.

Recommendations

To help company boards improve corporate governance of privacy and
security, the advance findings of the research included recommendations
for organizations to undertake key governance activities, such as:

* Establish the “tone from the top” for privacy and security
through top-level policies.
* Review roles and responsibilities for privacy and security and ensure
they are assigned to qualified full-time senior level professionals and
that risk and accountability are shared throughout the organization.
* Ensure regular information flows to senior management and boards on
privacy and security risks, including cyber incidents and breaches.
* Review annual IT budgets for privacy and security, separate from the
CIO’s budget.
* Conduct annual reviews of the enterprise security program and
effectiveness of controls, review the findings, and ensure gaps and
deficiencies are addressed.
* Evaluate the adequacy of cyber insurance coverage against the
organization’s risk profile.

The advanced findings of the 2012 Carnegie Mellon CyLab Governance
survey will be available to download and at RSA Conference 2012.

The final survey report, which will also analyze differences in
responses from Asia, Europe and North America and responses by industry
sector, will be released in March 2012.

RSA Executive Quote:

Brian Fitzgerald, Vice President, Marketing, RSA

“The models for creating, delivering and managing IT services are in
a state of transformation driven by virtualization, cloud computing, the
hyper-connectivity of people and organizations, and the emergence of a
new class of ‘big data’ applications. With the convergence of these
trends amid an increasingly complex compliance and threat landscape,
executives and boards must be actively engaged in ensuring their
organizations are addressing these risks while reaping the benefits of
next generation IT.”

Carnegie Mellon Executive Quote:

Jody Westby, CEO of Global Risk & Adjunct Distinguished Fellow,
Carnegie Mellon CyLab

“Privacy and security are competitiveness issues, and companies that
set the tone of a ‘trusted workplace’ with their employees also
convey the message of a ‘trusted business’ to the marketplace.
Effective governance enhances profitability through the mitigation of
liabilities and losses associated with compliance costs, operat
ional
downtime, cybercrime, and theft of intellectual property.”

Additional Resources:

* Download the 2012 Carnegie Mellon CyLab Governance survey
* Visit the RSA Thought Leadership page on EMC.com
* Learn more about Trusted IT from EMC
* Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA
Speaking of Security Blog and Podcast

About Carnegie Mellon CyLab: Carnegie Mellon CyLab is a
university-wide, multi-disciplinary research and education centre for
computer and network security, information security and software
assurance. CyLab is located in the College of Engineering at Carnegie
Mellon University. For more, see www.cylab.cmu.edu.

About RSA

RSA, The Security Division of EMC is the premier provider of security,
risk and compliance management solutions for business acceleration. RSA
helps the world’s leading organizations solve their most complex and
sensitive security challenges. These challenges include managing
organizational risk, safeguarding mobile access and collaboration,
proving compliance and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption
& key management, SIEM, Data Loss Prevention, Continuous Network
Monitoring, and Fraud Protection with industry leading eGRC capabilities
and robust consulting services, RSA brings visibility and trust to
millions of user identities, the transactions that they perform and the
data that is generated. For more information, please visit www.RSA.com
and www.EMC.com.

About EMC

EMC Corporation is a global leader in enabling businesses and service
providers to transform their operations and deliver IT as a service.
Fundamental to this transformation is cloud computing. Through
innovative products and services, EMC accelerates the journey to cloud
computing, helping IT departments to store, manage, protect and analyze
their most valuable asset - information - in a more agile, trusted and
cost-efficient way. Additional information about EMC can be found at
www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

CA Technologies Extends Content-Aware Identity and Access Management, Delivers Security Solution for Microsoft SharePoint

CA Technologies Extends Content-Aware Identity and Access Management, Delivers Security Solution for Microsoft SharePoint

 

Company Enhances CA SiteMinder, CA DataMinder to Drive Next-Generation IAM and Improved Information Security, Risk Management

 

SAN FRANCISO, February 27, 2012, RSA Conference – CA Technologies (CA: NASDAQ) today announced advancements to further build-out its Content-Aware Identity and Access management (IAM) vision and deliver a security solution for Microsoft® SharePoint® to help improve information security, reduce risk and meet compliance mandates.

 

Traditional IAM stops at the point of access. CA Technologies Content-Aware IAM vision, a next-generation approach, takes IAM a step further to help control users, their access and how they handle information. This innovative approach helps organizations protect critical information from inappropriate use or disclosure.

 

“Balancing business productivity and enablement with security and data protection is one of the top priorities for the Chief Security Officer. This is made more difficult by today’s collaborative environments that include extended teams from within and outside an organization,” said Mike Denning, general manager, Security, CA Technologies. “For example, there are more than 65,000 Microsoft SharePoint customers, which equates to a lot of users accessing a lot of data. The challenge is to make sure the right users access the right data and handle it in the right way, which requires a layered security approach that includes Content-Aware Identity and Access Management from CA Technologies.”

 

To help address these challenges, CA Technologies is adding capabilities and integrating new releases of CA SiteMinder® and CA DataMinder™ (formerly CA DLP), to deliver a Content-Aware security solution and help organizations protect the information stored, accessed and used in the Microsoft SharePoint environment. The CA SiteMinder and CA DataMinder updates, and resulting solution for SharePoint, will be available in March.

 

Solution for Microsoft SharePoint

 

As organizations realize the vast productivity benefits from Microsoft SharePoint, they may face accelerated growth of siloed SharePoint instances, the proliferation of sensitive data across the SharePoint environment and increased compliance mandates.

 

CA DataMinder includes CA DataMinder™ Classification, which dynamically scans, locates and classifies sensitive content stored within Microsoft SharePoint, including intellectual property, financial information and PII such as social security numbers, credit card numbers and other employee relevant data. CA SiteMinder 12.5 will be enhanced to use the content classification information from CA DataMinder as input for access policies to more precisely determine whether a user should be granted access to a document. This combination will provide more fine-grained and better defined access control, helping to improve the security of data without hampering productivity.

 

CA Technologies security solution for Microsoft SharePoint will provide the following capabilities: 

·         Convenient authentication through CA SiteMinder single sign-on, authentication, authorization and auditing;

·         Content-aware access management with automatic data discovery, classification and content-aware access control; and

·         Information lifecycle control for SharePoint data from creation, storage, access, distribution and disposal.  

“We have supported many implementations for IAM systems – all improving security postures for those customers. A next-generation IAM approach that classifies and flags documents with sensitive content and then associates identity and access policies with that content will further enhance information protection,” said Jason Wilcox, manager, Security Practice at YASH Technologies, a leading technologies and services outsourcing partner. “We are excited about the advancements that CA Technologies is making in the market, and look forward to working with our clients to advance the way they implement identity and access management.”

 

CA Technologies first delivered capability for Content-Aware IAM by associating content and data policies with identities and roles managed by CA IdentityMinder™ (formerly CA Identity Manager). This helps to better control and protect information as users and groups change within organizations. By enabling CA SiteMinder to use content classification information, data security is strengthened by adding the access element.

 

In addition, as organizations begin to shift from IT rationalization and optimization to deliver business service innovation and growth, CA Technologies Content-Aware IAM technologies help enable and secure organizations to achieve business outcomes such as speed, cost and risk efficiencies and improved performance. The key is to strike the balance between security and business enablement.

 

The CA SiteMinder 12.5 release will include a number of additional core improvements including simplified management, support for Web 2.0 / Identity 2.0 technologies and enhanced federation management. Visit the CA Security Management blog for further details on the new releases of CA SiteMinder and CA DataMinder.

 

CA IAM Solutions Adopt the “Minder” Brand

 

Building on the strong brand equity of CA SiteMinder, CA Technologies has renamed the products and solutions in its security portfolio using the “Minder” naming convention. Visit http://bit.ly/wtzJCN to see the new names.

 

About CA Technologies

 

CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments – from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at www.ca.com.

 

Follow CA Technologies

 

Twitter

Social Media Page

Press Releases

 

Legal Notices

 

Copyright © 2012 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. Microsoft and SharePoint are registered trademarks of Microsoft. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.




(download)

Huawei Device Launches a New Era for the Smart Mobile Office

 

Huawei Device Launches a New Era for the Smart Mobile Office


Announces Cooperation With IBM GBS to Support Enterprise Mobility Platforms

BARCELONA, Spain, Feb. 27, 2012 /CNW/ - Huawei Device today announced at Mobile World Congress 2012 a Smart Workspace@Mobile solution developed for the enterprise mobility market.

To support this new direction, Huawei Device announced that they will strategically partner with IBM Global Business Services in China, to develop an innovative solution for the enterprise mobility market providing clients with a secure, intelligent mobile solution, ushering in a new era of the 'smart mobile worker'.

"We believe this collaboration builds on the strengths of two great companies and will address the changing needs of the workforce within enterprises," said Mr Wan Biao, CEO of Huawei Devices. "Today, enterprise mobile office will not only need automation but also need to drive new service channels, enhance asset and logistics management, offering customers additional business-oriented services. The launch of this new Smart Workspace@Mobile solution will redefine a new era for the enterprise mobility market in China."

This solution aims to provide an 'anytime, anywhere professional secure office environment' on smart devices that are integrated with tailored industry applications. Each device is enabled to be cost effective, efficient and secure.  The Smart Workspace@Mobile solution addresses the growing demand in China for smart mobile office solutions which integrate effectively with Enterprise Resource Planning systems (ERP), Customer Relationship Management (CRM), Supply Chain Management (SCM), and inventory management delivered within a cloud environment.

IBM Global Business Services in China will provide the overall consulting to support the enterprise foundations for ERP systems. Huawei Device will undertake the solution integrator pilot providing the convergent smart devices based on the operating platform - Mobile Device Management (MDM). This will ensure that companies can have their back end management systems extend to smart phone and tablet devices tailored to a specifically customized industry process.

"With their strength in smart device technologies and the expanding operator [broadband] coverage in China, Huawei's collaboration with IBM Global Business Services to provide consulting and enterprise platform integration will ensure that work moves securely and efficiently from a PC-base to a mobile office environment," said Ms. Shirley Yu-Tsui, General Manager, Global Business Services, IBM Greater China Group.

This solution will integrate entire cross-business processes including market sales, channel management, store management, mobile sales, customer service, devise management, inventory management and office management all in one device.  The solution will also support three industries; the consumer goods sector with solutions developed for inventory optimization, synchronized distribution and shop management.

The energy sector services will be developed to enable asset management, secure access, equipment testing and remote positioning.

In the retail sector, the Smart Workspace@Mobile solution will provide applications to accelerate product exhibition, store operation, market information collection, customer management, channel visit and office automation.

About Huawei Device

As of the end of 2011, Huawei Device has been providing products and services to more than 500 operators around the world. Its product offerings range from mobile phones to mobile broadband devices, home devices, etc. Committed to ensuring a global customer centric approach innovating and transforming their mobile internet applications.

For more information, please visit http://www.huaweidevice.com/cn

About IBM

IBM (NYSE: IBM), founded in 1911 in the United States, is the largest information technology and business solution provider in the world. It has more than 400,000 employees worldwide, with business presence in over 160 countries and regions.  For more information about IBM, please visit our company website at http://www.ibm.com/cn

For further information:

Huawei Device Public Relations, Hu Yue Heng, Tel: (86-755)36837699, Mobile: (86)13923401221 Email: huyueheng@huawei.com; IBM External Relations, Dong Meng, Tel: (86-10)63618072, Mobile: (86)13911080680, Email: dongmeng@cn.ibm.com


Symantec Advances Enterprise Mobility Strategy Across Android, iOS and Windows Phone 7 Platforms

Image001

  Symantec Advances Enterprise Mobility Strategy, Delivers New Innovations to

Improve Data Security and Facilitate Broader Application Adoption

 

 

BARCELONA, Spain – Mobile World Congress 2012 – Feb. 27, 2012 – Symantec Corp. (Nasdaq: SYMC) today announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection. Key highlights include:

 

·         New Symantec Mobile Management for Microsoft System Center Configuration Manager (SCCM)

·         Enhanced native mobile device management for Android and Windows Phone 7

·         New Symantec Mobile Security for Android

·         New Symantec Data Loss Prevention for Tablets integration with Mobile Management

·         New Symantec Managed PKI Service integration with Mobile Management

·         Symantec O3 tie with Symantec’s enterprise mobility platform

 

Click to Tweet: Symantec advances enterprise mobility strategy with enhancements on Android, iOS, Windows Phone 7: http://bit.ly/xqT9Mm

 

Symantec is empowering enterprises to foster mobile productivity by enabling new business models that rely on diverse mobile devices and innovative mobile applications. Symantec’s comprehensive data and application security address enterprises’ concerns by applying corporate security policies uniformly on all mobile devices, endpoints and applications. Symantec’s modular enterprise mobility platform will allow these services to be delivered via on-prem and SaaS models, as part of existing security and management solutions, to drive operational efficiencies and lower total-cost-of-ownership.

 

“Our recent State of Mobility Survey highlighted that 59 percent of enterprises are making line-of-business applications accessible from mobile devices, representing a dramatic shift in the nature of mobility from an email extension to a core business enabler,” said CJ Desai, senior vice president, Endpoint and Mobility Group, Symantec. “Symantec is at the forefront of enabling enterprise productivity. With these new enhancements to our mobile portfolio, we will offer the most comprehensive solution set for securing mobile devices, apps and data. With Symantec, enterprises no longer have to choose between productivity and security. We are changing the game by allowing them to confidently achieve both.”

 

Read more detailed blog post:

 

This announcement advances Symantec’s enterprise mobility strategy by enhancing capabilities in device management, threat protection and enterprise integration.

 

Device Management

For enterprises that need a solution to centrally secure and manage mobile devices and applications, Mobile Management includes security policy management and application management for Android, iOS and Windows Mobile 7 platforms. From a unified management perspective, Symantec is announcing Mobile Management for Microsoft SCCM will be generally available in March. This, in addition to existing integration with Altiris IT Management Suite from Symantec, will make Mobile Management available for two of the most widely deployed management platforms. This enhanced support gives enterprises the visibility and control required to confidently embrace the proliferation of mobile devices.

 

Threat Protection

According to Symantec’s State of Mobility Survey, 67 percent of enterprises are concerned with malware attacks spreading from mobile devices to internal networks. With multiple app stores and unchecked applications, Android is a frequent target for malware, raising the possibility of data theft and browser-based phishing attacks. In response, Symantec plans to bring its anti-malware technology and global intelligence network capabilities to the Android platform with Mobile Security for Android. With the release of Mobile Security for Android, Symantec will help prevent rogue applications from stealing corporate and personal data and will enable safe web browsing. This solution will be generally available in late summer 2012.

 

Enterprise Integration

According to the same survey, 65 percent of enterprises cited data loss as one of their top concerns for mobile adoption. Symantec addresses the problem with Data Loss Prevention for Tablets, which is now generally available. Available first for the iPad, this solution monitors and controls the transmission of confidential data by applying industry leading fingerprinting and advanced machine learning technologies. Combined with Symantec’s recent release of Mobile Management, Data Loss Prevention for Tablets provides the industry’s strongest closed-loop solution to enable organizations to support business productivity and personal use concurrently across corporate and personal email, web communications and native applications.

 

No enterprise data is secure without proper access and authentication policies in place. To enable strong user and device authentication to enterprise networks and applications, Mobile Management is integrated with the new Managed PKI Service v8.3, which includes certificate management enhancements for iOS devices. This simplified integration automates the steps involved in extending PKI systems to mobile devices for user identity and authorization, speeding the time to value with a user friendly, transparent process.

 

With 31 percent of IT personnel currently dealing with mobile related initiatives,[1] driving efficiency and lower total-cost-of-ownership is paramount. To deliver a broader array of choices for enterprises to manage their mobile deployments, Symantec will be making its enterprise mobility platform available. This console-agnostic platform will help Symantec extend its reach in the protection of mobile users by allowing enterprises, partners and telcos to quickly and efficiently integrate their offerings with a common web services and agent architecture.

 

In combination with Symantec O3 – the company’s cloud information protection platform – the Symantec enterprise mobility platform will enable secure usage of cloud apps from mobile devices. This combination provides layered information security and information management controls on the device and in the cloud to secure native applications as well as SaaS use-cases. With support for a wide variety of cloud apps and services and integration with wide variety of identity sources, Symantec enables innovative business models created in the confluence of cloud and mobile technologies.

 

 

Additional Quotes

·         “Securing tablets is a hot issue. It’s where the workforce is going, and it is critical to control the information that is leaving from these devices. Symantec Data Loss Prevention for Tablets does just that, it ensures the confidential data on tablets will be protected and helps to balance the need for security with productivity of users.” – Robert Kalinofski, Principal Consultant , Carbn Security

 

·         “The overwhelming demands of consumerization and access to information from mobile devices is leaving enterprise IT departments to struggle with the requirements of device choice, the new era of mobile apps and the blurred lines between corporate and personal data. Organizations must look to secure the complete ecosystem: devices, apps and data. Doing that in an efficient manner that enables business productivity will be key to success.” – Leif-Olof Wallin, Research VP, Gartner

 

Related

 

Connect with Symantec

 

About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

 

###

 

Note to Editors: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at www.symantec.com/news. Any prices noted are in U.S. dollars and are valid only in the United States.

 

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Forward-Looking Statements: Any forward-looking indication of plans for products and services are preliminary and all future release dates are tentative and are subject to change. Any future release of a product, service or planned modifications to product capability, functionality or features are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.

Technorati Tags

Symantec, security, management, mobile security, mobile management, smartphones, tablets, mobile devices, smart devices, consumerization of IT, BYOD, mobile applications

 

wordlogo

 

 

McAfee Delivers on Mobile Security Vision to Protect Devices, Data and Apps for Consumers and Organizations

 

McAfee Delivers on Mobile Security Vision to Protect Devices, Data and
Apps for Consumers and Organizations

Momentum Grows with New Mobile Security Solutions, Global Partnerships
and Industry Recognition

MOBILE WORLD CONGRESS, BARCELONA, SPAIN - Feb. 27, 2012 -McAfee today
announced a series of technology advancements that deliver upon its
vision of providing comprehensive mobile security and privacy protection
for devices, data and apps. McAfee® Enterprise Mobility Management
(EMM™) 10.0, available now, includes significant security updates for
enterprise customers to enable ‘bring your own device’ practices.
With EMM 10.0, IT professionals will have improved control to identify,
secure and assign policies to both employee- and business-owned
smartphones and tablets.

“Mobile devices are continuing to grow rapidly and have become a
staple in work, life and play,” said John Thode, executive vice
president and general manager of McAfee’s consumer, mobile and small
business unit. “As a result, consumers and organizations need to
ensure these devices are protected from loss, data theft and malware
that can be distributed via direct downloads, links, email attachments
and text messaging. We’re excited about our 2012 line-up of mobile
security products and the new features and functionally that will help
smartphone and tablet users experience a worry-free mobile computing
experience.”

Expanded Data Security, Application Security and Ease of Administration


McAfee EMM software gives enterprises the ability to offer their
employees mobile device choice, while delivering secure and easy access
to mobile corporate applications. With secure mobile application access,
strong authentication, and compliance reporting via the McAfee® ePolicy
Orchestrator® platform, McAfee EMM software brings the same level of
control to mobile devices - including employee-owned smartphones and
tablets - that IT applies to laptops and desktops. New features and
functionality include:
● Expanded Data Security: Email “Sandboxing” for iOS prevents
corporate email from being forwarded from a personal mailbox and Block
iCloud Backup for iOS prevents the user from moving corporate data from
device to iCloud. Next month, McAfee plans to release an integrated
Secure Container for Android that segregates corporate email, calendar
and contacts from personal data, according to corporate security
policies.
● Enhanced Application Security: Application Blacklisting for Android
and iOS allows the administrator to define a set of applications and
block access. Administrators can also block untrusted SSL certificates
to prevent access to malicious sites.
● Ease of Administration: Bulk provisioning for Android and iOS
expedites the authorization of mobile devices to large groups of
enterprise users; increased scalability  enables management of up to
15,000 devices per server.

McAfee is also announcing a new version of McAfee VirusScan® Mobile
Security for Enterprise.  IT departments can now deploy comprehensive
anti-malware security across all employee- and business-owned Android
devices.  McAfee VirusScan Mobile prevents malware from entering the
corporate domain with automatic, up-to-date scanning for malware in
files, memory cards, applications, Internet downloads and text messages.
 Designed specifically for mobile devices, McAfee VirusScan Mobile for
Enterprise is unmatched in ease of use, low power consumption, and rapid
file scanning.

Enhanced Protection for Consumers

Earlier this month, McAfee announced McAfee® Mobile Security 2.0 for
consumers, which offers an all-encompassing approach to elude mobile
security threats and to protect a user’s privacy when using
smartphones and Android tablets. McAfee Mobile Security combines
powerful antivirus, anti-theft, call and SMS filtering, and web and app
protection. It was also recently awarded with the LAPTOP Magazin
e
“Editors’ Choice” award for best mobile security app.

McAfee has been cementing its leadership position with many of the
principal figures in the mobile industry globally, including Lenovo, NTT
Docomo, Softbank, Singtel, Vodafone Australia, Sprint and many others in
order to continuously provide users with confidence to explore
everything the new mobile world has to offer.  When users select new
apps, shop online, browse social networks, or use their phone for
banking and payments, McAfee mobile security solutions are there to
protect them.

Additional Information

For more information on McAfee’s consumer to enterprise mobile
security offerings, please visit www.mcafee.com/mobilesecurity. McAfee
can also be seen the week of Feb. 27 at Mobile World Congress in
Barcelona, Spain, at the Intel booth in Hall 8 and at the RSA Conference
in San Francisco, CA at McAfee Booth #1117 or Intel Booth #1324.

About McAfee
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC),
is the world's largest dedicated security technology company. McAfee
delivers proactive and proven solutions and services that help secure
systems, networks, and mobile devices around the world, allowing users
to safely connect to the Internet, browse and shop the Web more
securely. Backed by its unrivaled Global Threat Intelligence, McAfee
creates innovative products that empower home users, businesses, the
public sector and service providers by enabling them to prove compliance
with regulations, protect data, prevent disruptions, identify
vulnerabilities, and continuously monitor and improve their security.
McAfee is relentlessly focused on constantly finding new ways to keep
our customers safe. http://www.mcafee.com.

McAfee Canada is headquartered in Markham, Ontario, with regional
offices across Canada. The company's Consumer Software Research and
Development facility in based in Waterloo, Ontario.

- 30 -

Note: McAfee, VirusScan, EMM and the McAfee logo are registered
trademarks or trademarks of McAfee, Inc., or its subsidiaries in the
United States and other countries. Other names and brands may be claimed
as the property of others. ©2012 McAfee, Inc. All rights reserved.

For more information, please contact:
Andrew Gouveia/Dianna Lai
StrategicAmpersand Inc. (for McAfee Canada)
andrew@stratamp.com/dianna@stratamp.com
McAfeePR@stratamp.com
(416) 961-5595

 


Trend Micro(TM) Deep Discovery Delivers Breakthrough Protection Against Advanced Persistent Threats and Targeted Attacks

 

Trend Micro(TM) Deep Discovery Delivers Breakthrough Protection Against Advanced Persistent Threats and Targeted Attacks


New threat management solution focuses on targeted attack detection and analysis,

OTTAWA, Feb. 27, 2012 /CNW/ - Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, today announced Deep Discovery, the third generation of Trend Micro's threat management solution. Deep Discovery delivers new features and performance designed to help large enterprise and government organizations combat advanced persistent threats (APTs) and targeted attacks.

APTs and Targeted Attacks are the new norm and here is why:

  • Targeted attacks and APTs are becoming commonplace across a wide range of industries and organizations
  • Consumerization, virtualization and cloud computing are weakening the role of perimeter security and further opening the network to these attacks.
  • Because standard security defenses cannot detect or prevent these attacks, new proactive measures and specialized technology as part of risk management due diligence are recommended.
  • Large enterprise and government organizations are demanding specialized threat detection and analysis capabilities to reduce their risk of attack and data loss.

Deep Discovery Combats APTs and Targeted Attacks

Trend Micro Deep Discovery provides the network-wide visibility; insight and control needed to reduce the risk of APTs and targeted attacks. Specialized detection engines focus on identifying advanced malware and human attacker activity across all the stages of a targeted attack sequence. And, real-time dashboards provide the in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data.

"Deep Discovery is the result of Trend Micro's thorough understanding of targeted attacks around the world, interviews with our major customers, and the input of a special product advisory board from leading organizations and government agencies," said Jim Short, Trend Micro Canada General Manager and Senior Vice President. "Working together we have created an innovative solution to effectively combat APTs and targeted attacks."

Meeting the Needs of Large Enterprise and Government Customers

Deep Discovery delivers a broad set of features important to any size organization, but especially critical to larger organizations wishing to reduce the risk of targeted attack.

Deep Discovery is now integrated with leading SIEM (Security Information and Event Management) platforms to allow SIEM customers to combine Deep Discovery's unique network intelligence with the full range of events collected and analyzed by SIEM.

Deep Discovery features a new high-performance architecture designed to meet the demanding and diverse capacity requirements of large enterprises. The product is available in a full range of hardware, software and virtual formats supporting multi-gigabit corporate backbones down to remote office locations.

Deep Discovery is part of Trend Micro Real-Time Threat Management Solutions designed to offer network-wide visibility and control, actionable threat intelligence, and timely vulnerability protection needed to minimize exposure to advanced threats.

Supporting Quotes

Beth Israel Deaconess Medical Center, Boston, MA

"Never before have we experienced such an unequivocal requirement for security oversight of our critical infrastructure in the healthcare industry," said John Halamka, chief information officer, Beth Israel Deaconess Medical Center. "We are pleased that Trend Micro is focusing its security innovation to help maintain advancements in patient care and protect our critical infrastructure."

Additional Materials -

For more information on APTs and targeted attacks, click here:

http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_esg-real-time-threat-management.pdf

Deep Discovery general availability expected in Q2.

About Trend Micro

Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.

For further information:

Claire M. Tallarico, 416 616 9940


Allot MobileTrends Report H2, 2011 Shows VoIP and IM Traffic Grew by 114%

Click here to download:
WPM$CZ6O.PM$ (7 KB)


Allot MobileTrends Report H2, 2011 Shows VoIP and IM Traffic Grew by 114%

Traffic Represents a Clear Challenge to Operator Legacy Services

BOSTON, Feb. 21, 2012 /CNW/ - Allot Communications Ltd. (NASDAQ: ALLT), a leading supplier of service optimization and revenue generation solutions for fixed and mobile broadband service providers worldwide, announced today that its H2, 2011 Allot MobileTrends Report shows that mobile data bandwidth usage continued its steady rise with 83% growth during the second half (H2) of 2011 based on data collected from Allot's worldwide mobile operator customers. This is the seventh MobileTrends Report to date.

(Photo: http://www.newscom.com/cgi-bin/prnh/20120221/511437 )

Video streaming continued to show significant growth with a 88% increase, and remains the single largest application taking up bandwidth, accounting for 42% of mobile bandwidth. Although having limited impact on the total bandwidth, VoIP and Instant Messaging (VoIP & IM) have gained additional share and continue to be the fastest growing application type with a 114% increase. This data seems to be in line with the declining SMS and international voice calls revenue experienced by operators.

Main findings include:

  • Mobile broadband traffic grew by 83% in the second half of the year with a CAGR of 234% during 2011.
  • VoIP & IM traffic grew by 114%, perhaps substantiating recent reports on SMS and international voice calls decline.
  • Video Streaming traffic continues to dominate mobile broadband, with a share of 42% of total bandwidth.
  • Android Market traffic grew by a phenomenal 232%, almost four times faster than the Apple App Store, increasing its momentum to become a true Apple App Store rival.
  • YouTube now accounts for 24% of the total broadband traffic; 14% of total YouTube traffic is high-definition.
  • WhatsApp now accounts for 18% of the IM total bandwidth, a dramatic increase in popularity from only 3% in H1, 2011.
  • Facebook messenger is an all-time 'killer app' on mobile; rising from zero to 22% of total IM traffic in just four months.

"The phenomenal growth of OTT VoIP and IM represents both a challenge and an opportunity for mobile operators," said Andrei Elefant, Allot's Vice President of Marketing and Product Management. "Intelligent, application-based data pricing is the way forward for operators, allowing them to maximize data revenues based on its true value to subscribers."

The Allot MobileTrends Report data was collected from July 1 to December 31, 2011 from leading mobile operators worldwide with a combined user base of approximately 250 million subscribers. The Report is based on anonymous data collected by using the long term reporting capabilities of Allot NetXplorer, Allot's centralized management and reporting system. The length of the collection period allows for increased accuracy in the identification of usage trends and patterns, reducing the influence of temporary events in the monitored networks.

The full Allot MobileTrends Report (complete with graphics) can be found on http://www.allot.com/MobileTrends_Report_H2_2011.html

Trademark Notice

Some terms used in this press release such as Android Market™, YouTube™, Google™, Apple® and Facebook® are trademarks of their respective owners.

About Allot Communications

Allot Communications Ltd. (NASDAQ: ALLT) is a leading provider of intelligent IP service optimization and revenue generation solutions for fixed and mobile broadband operators and large enterprises. Allot's rich portfolio of solutions leverages Dynamic Actionable Recognition Technology (DART) to transform pipes into smart networks that can rapidly and efficiently deploy value added Internet services. Allot's scalable, carrier-grade solutions provide the visibility, topology awareness, security, application control and subscriber management that are vital to managing Internet service delivery, enhancing user experience, containing operating costs, and maximizing revenue in broadband networks.

For further information:

Allot Communications Contact:

Jonathon Gordon

Director of Marketing
Allot Communications
Tel: +972-9-7628423
jgordon@allot.com

PR Contact
Justine Schneider

Calysto Communications
Tel: +1-404-266-2060 x507
jschneider@calysto.com


  

Cisco and NetApp Help Customers Accelerate Transition to Microsoft Private Cloud

Cisco and NetApp Help Customers Accelerate Transition to Microsoft Private Cloud

Avnet Technology Solutions Expands Its FlexPod Services to Offer Custom Configuration of the Validated Cisco, Microsoft, and NetApp Solution to Resellers

SAN JOSE AND SUNNYVALE, Calif. — February 23, 2012 — As data center virtualization becomes more pervasive, IT functions are increasingly seeking to lower cost of ownership and improve manageability by unifying silos of information with shared IT infrastructures and multi-hypervisor environments. To meet growing customer demand for choice and flexibility, Cisco and NetApp (NASDAQ: NTAP) are announcing the availability of a Cisco® Validated Design (CVD) for the FlexPod™ shared infrastructure and Microsoft private cloud. The new FlexPod solution validated with Microsoft private cloud builds on a reference architecture that was announced last year and is designed to reduce infrastructure and application deployment time from days to hours while helping achieve greater utilization of physical and virtual resource pools. Part of a series of innovative joint solutions that Cisco and NetApp are bringing to market with support from Microsoft, the FlexPod solution is currently available for demonstration in select Microsoft Technology Centers (MTCs) around the world, allowing partners and customers the opportunity to see firsthand the many benefits of the solution.  

To help channel partners further accelerate and simplify customers’ transitions to private clouds, Cisco and NetApp are working with Avnet Technology Solutions, an operating group of Avnet, Inc. (NYSE: AVT), to expand its FlexPod Services to provide partners in the United States and Canada with the validated, pretested data center solution for the cloud.

Key Facts / Highlights:

New FlexPod solution validated with Microsoft private cloud

  • Validated by Microsoft as part of its Private Cloud Fast Track program, the new FlexPod validated shared infrastructure features the Cisco UCS™ server, Cisco network switches, NetApp® unified storage systems running on Data ONTAP® software, and the Microsoft Private Cloud Fast Track architecture with Windows Server 2008 R2 and System Center.
  • FlexPod is a pretested architectural design guide that combines networking, computing, and storage in a shared infrastructure and supports multiple applications and workloads to help customers accelerate and simplify their transition to the cloud. The flexible, scalable shared infrastructure is pretested to lower deployment risk, increase data center efficiencies, and create a flexible information technology (IT) environment to build a Microsoft private cloud.
  • The FlexPod solution validated with Microsoft private cloud goes beyond virtualization to drive real business value through deep insight into applications and to simplify the evolution to IT as a Service (ITaaS). The platform allows customers to orchestrate IT resources so they can deliver applications as services, rapidly resolve problems, increase application uptime, and meet desired Service Level Agreements (SLAs).
  • The FlexPod solution validated with Microsoft private cloud is deployed at select MTCs worldwide, allowing customers to see the power of Microsoft System Center with Windows Server Hyper-V on the FlexPod shared infrastructure. Partners and customers have direct access to FlexPod deployments and can engage with Cisco, Microsoft, and NetApp technology experts through briefings, architectural design sessions, and proof-of-concept engagements.

Avnet Support for the FlexPod solution validated with Microsoft private cloud

  • As part of its FlexPod Services, Avnet will now provide its channel partners with a single source for delivery of the Microsoft private cloud built on FlexPod solution. Avnet will offer multiple configurations to help channel partners meet different customer requirements, especially for those working with customers in the high-growth vertical markets of energy, finance, government, healthcare, and retail.
  • Avnet’s expanded FlexPod Services are designed to help channel partners deliver the FlexPod solution validated with Microsoft private cloud quickly and easily. They include pre-sales support, consolidated quoting, single order capability, assembly and testing, ship complete, and tracking. Additionally, channel partners will be able to work hand in hand with a dedicated Avnet team to support all of their FlexPod needs, as well as draw upon additional support and expertise from Avnet's dedicated Cisco and NetApp teams.
  • FlexPod Services from Avnet allow channel partners to focus their resources on core business strategies while Avnet handles the complexities of solution development and supply-chain management.

Cisco and NetApp FlexPod Shared Infrastructure

  • Since Cisco and NetApp’s FlexPod was announced in November 2010, both channel partners and customers have embraced the benefits of the solution. To date, approximately 500 joint channel partners worldwide are certified to sell FlexPod and more than 600 customers have deployed FlexPod in their data center infrastructure, representing more than 400% growth in customer adoption since May 2011.
  • To provide greater flexibility and customer choice, FlexPod currently offers 13 Cisco Validated Designs supporting multiple hypervisors, business applications and workloads. Cisco and NetApp will sponsor Microsoft Management Summit (MMS) 2012, where these and other private cloud solutions will be demonstrated.
  • NetApp and Cisco offer programs to support FlexPod to give channel partners access to a wide range of unique tools and resources to help partners differentiate their services, speed time to market, and grow their revenues. The channel programs include technical trainings and service benefits, as well as marketing and sales support.

Supportive Quotes:

  • Brad Anderson, corporate vice president, Management and Security, Microsoft
    “Customers find unique value in Microsoft’s private cloud because of our cross-platform approach—you can build one private cloud for your heterogeneous workloads and platforms. The FlexPod solution validated with Microsoft private cloud implements best practices for effectively integrating server, storage, and network elements with Windows Server, Hyper-V, and System Center. By combining Cisco and NetApp solutions with Windows Server Hyper-V and System Center, we can give our joint customers an integrated, agile, and efficient data center environment.”
  • Carol Kinney, vice president for FlexPod Services, Avnet Technology Solutions, Americas
    “Working collaboratively with Microsoft, Cisco, and NetApp, Avnet focused on streamlining the development and delivery of Microsoft private cloud built on FlexPod solutions for our channel partners. Avnet also created a suite of services to shorten and simplify the sales cycle, making it easier for our channel partners to go to market with this new solution. Avnet's FlexPod Services and our single-resource capabilities allow us to ensure that our channel partners, and their customers, have a consistent and positive experience.”
  • Satinder Sethi, vice president, Server Access Virtualization Technology Group, Cisco
    “The FlexPod validated with Microsoft private cloud reinforces Cisco’s commitment to offering a range of data center solutions that enable our channel partners to offer customers more choice and flexibility. Microsoft customers can now use shared infrastructure and integrated management to complement Microsoft’s deep application insights, along with the ability to automatically orchestrate resources from the FlexPod, to enable customers to deliver applications as services and meet demanding business service-level agreements.”
  • Phil Brotherton, vice president of the Enterprise Software Group, NetApp
    “The strong market demand for Microsoft private cloud solutions built on NetApp and Cisco technologies further reinforces the importance of this strategic three-way partnership. Together, we are bringing compelling, innovative solutions to market that enable our joint partners and customers to build secure private clouds optimized for efficiency, flexibility, and fast time to value. NetApp’s ongoing and proven integrations with Cisco UCS and Windows Server, Hyper-V, System Center, and applications underscore our commitment, and we look forward to much more to come at the Microsoft Management Summit in April.”

Additional Resources:

About Cisco
Cisco (NASDAQ: CSCO), is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Information about Cisco can be found at www.cisco.com. For ongoing news, please go to newsroom.cisco.com.

About NetApp
NetApp creates innovative storage and data management solutions that deliver outstanding cost efficiency and accelerate business breakthroughs. Our commitment to living our core values and consistently being recognized as a great place to work around the world are fundamental to our long-term growth and success, as well as the success of our pathway partners and customers. Discover our passion for helping companies around the world go further, faster at www.netapp.com.

Press Contacts:

Pamela Ferrill
Cisco     
(408) 527-9076
pamfe@cisco.com
Sarah Tolle
NetApp
(408) 822-7986
sarah.tolle@netapp.com