Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Symantec Utilises Security Intelligence and Experts to Deliver Cyber Threat Analysis Program

Symantec Corp. (Nasdaq: SYMC) today announced the Symantec Cyber Threat Analysis Program (CTAP), a comprehensive approach to capture and identify globally pertinent security intelligence, provide localised threat identification and deliver sound remediation and countermeasures to protect critical client information and improve overall security posture.
  • 29 July, 2009 11:16

<p>Program Mitigates Cyber Risk with Threat Identification, On-Site Intelligence Gathering and Impact Assessment to Provide Countermeasure Support</p>
<p>SYDNEY, Australia – July 29, 2009 – Symantec Corp. (Nasdaq: SYMC) today announced the Symantec Cyber Threat Analysis Program (CTAP), a comprehensive approach to capture and identify globally pertinent security intelligence, provide localised threat identification and deliver sound remediation and countermeasures to protect critical client information and improve overall security posture. CTAP provides access to one of the largest commercial repositories of cyber security-focused vulnerability data and cyber threat intelligence combined with Symantec’s broad security toolset. Symantec delivers this access through highly skilled analysts placed at a client’s site to strengthen the organisation’s defensive posture, while increasing their proactive capabilities.</p>
<p>As an addition to Symantec’s integrated, proven Security Intelligence Services, CTAP is designed to extend the customer’s view of the threat landscape and provide the resources to deliver effective risk mitigation and response efforts on demand. The program leverages Symantec’s extensive Global Intelligence Network and the broad security expertise only Symantec possesses to provide customers with detailed reports and validated intelligence on the attacks, malicious code activity, phishing and spam that organisations experience daily.</p>
<p>Symantec’s Internet Security Threat Report Volume XIV, released in April of 2009, demonstrated the extent of today’s cyber security threats. Symantec created more than 1.6 million new malicious code signatures in 2008 and blocked an average of more than 245 million attempted malicious code attacks across the globe each month during 2008. Furthermore, 90 percent of all threats detected by Symantec during the study period attempted to steal confidential information.</p>
<p>“Organisations today face the significant challenge of managing cyber security threats that arrive more quickly, are more sophisticated and allow for minimal time for proactive defense, combined with the pressure of driving down costs and leveraging past investments more effectively to enhance cyber security posture,” said Anil Chakravarthy, senior vice president, Symantec Enterprise Services. “The Symantec Cyber Threat Analysis Program mitigates cyber risk with a comprehensive approach to threat identification, intelligence gathering and validation, and delivers timely response by seasoned professionals to protect critical client information, all supported by specialised tools to enact response.”</p>
<p>As part of CTAP, Symantec Cyber Threat Analysts fuse client data and public data with CTAP intelligence to quickly identify emerging cyber security threats, determine the true nature of the attacks, develop countermeasures and enact solutions. By leveraging Symantec’s global repositories, the analysts give customers access to a depth and breadth of information and tools that are only attainable through this program, including:</p>
<p>• Attack, vulnerability and malicious code intelligence
• Phishing, spam, data leakage, spyware, adware and virus intelligence
• Underground cyber economies and honeypot network intelligence
• Symantec’s Cyber Threat Analysis Program analyst community
• Cyber research facilities and support
• Related analysis and cyber specific reports</p>
<p>Symantec provides both on-site and remote experts who customise the analysis, response and actions to meet the design specifications for each client. Deep expertise focuses on four key areas: cyber intelligence, network operations analysis, malicious code analysis and forensics. CTAP leverages sophisticated tools, including data intelligence repositories with embedded toolsets, along with Symantec internal systems, enabling CTAP analysts to identify emerging Internet security threats, develop defenses and distribute solutions to create a more secure operational environment thereby enhancing organisations’ situational awareness and response.</p>
<p>“For most organisations, dealing with today’s security threats and vulnerabilities requires significant internal resources to proactively manage risk,” said Irida Xheneti, Security Services Research Analyst at IDC. “Securing corporate assets in an era of extensive technology advancement and rapid proliferation of threats, organisations are looking for comprehensive and proactive security solutions that will enable them to quickly detect vulnerabilities and quickly mitigate them. Through the Symantec Cyber Threat Analysis Program, customers will be able to leverage proactive security intelligence and expertise to improve their organisation’s risk management posture in a cost effective manner.”</p>
<p>Symantec Global Intelligence Network</p>
<p>The Symantec Global Intelligence Network maintains massive databases from data collected around the world to identify emerging threats, develop defenses and distribute solutions. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled ability to identify, analyse, deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam. Symantec maintains 11 Security Response Centers and utilises 240,000 attack sensors to track malicious activity.</p>
<p>Pricing and Availability</p>
<p>Symantec Cyber Threat Analysis Program is now available. Pricing is based on the number of CTAP Analysts an organisation retains. For more information, please visit</p>
<p>About Symantec</p>
<p>Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organisations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at</p>
<p>Press Contacts:</p>
<p>Jasmin Athwal</p>
<p>Max Australia</p>
<p>+61 2 9954 3492</p>
<p>Debbie Sassine</p>
<p>+61 2 8220 7158</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release