Welcome!

Big Data Journal Authors: Paige Leidig, Kevin Benedict, Liz McMillan, Elizabeth White, Pat Romanski

News Feed Item

Symantec's Website Security Solutions Advance the Future of Trust and Protection on the Internet

New SSL Algorithms and Web Security Products Prepare Enterprises for the Hyper-Connected Internet and New Encryption Requirements

MOUNTAIN VIEW, CA -- (Marketwire) -- 02/13/13 -- Symantec Corp. (NASDAQ: SYMC) unveiled new updates to its Website Security Solutions portfolio with innovative and comprehensive capabilities to meet the increasing security and performance needs for connected businesses. The WSS strategy focuses on protecting companies, meeting compliance requirements, improving performance and reducing infrastructure costs. The end result is to deliver trusted shopping, trusted advertising and trusted applications for businesses and their customers. The company also announced the first available multi-algorithm SSL certificates with new ECC and DSA options. These offerings will help organizations protect their web eco-systems and strengthen the foundation of trust online.

Read more detailed blog post: Algorithm Agility ECC & DSA Blog

"As companies execute their web strategies, they face increased complexities in protecting their business in a world of Internet-connected things," said Fran Rosch, Vice President Identity and Authentication Services, Symantec. "Website Security Solutions can solve their unique challenges with first-to-market solutions, ECC- and DSA-powered certificates, to secure and accelerate their business."

Click to Tweet: New SSL Algorithms and Web Security Products Prepare Enterprises for the Hyper-Connected Internet: http://bit.ly/V5FNtu

To stay ahead of new and sophisticated cyber threats, the National Institute of Standards and Technology (NIST) recommends all websites to migrate from RSA 1024-bit to 2048-bit certificates by January 1, 2014. Symantec began transitioning customers to its RSA 2048-bit SSL certificates last year. With today's announcement, the company broadens its SSL portfolio with new security algorithms to address this requirement with increased protection and performance.

ECC Algorithms Faster and Stronger

Symantec is the first CA to offer commercially available SSL certificates using Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA). ECC is currently scheduled to be available in Symantec™ Managed PKI for SSL first half of 2013. Based on internal testing(1), ECC advancements deliver the following advantages:

  • Greater security as Symantec ECC will be 10,000 times harder to break than an RSA 2048-bit key based on industry computation methods. Symantec 256-bit ECC certificates offer the equivalent security of a 3072-bit RSA certificate.
  • Improved server performance during peak loads with the ability to process more requests per second with lower CPU utilization, which becomes more important as mobile and tablet adoption place increasing demands on web infrastructure.
  • Improved server-to-desktop performance and response time. Internal testing showed a server with an RSA certificate handled 450 requests per second with an average response time of 150 milliseconds to the desktop clients. The server with an ECC certificate under the same conditions netted an average response of just 75 milliseconds.

ECC delivers higher scalability to handle the demands of online interactions across billions of connected endpoints, enabling organizations to make greater gains in their online information sharing, cloud services and global ecommerce initiatives. For end users, improved computational performance and enhanced infrastructure utilization increase their overall productivity for a more favorable experience.

Industry-leading Companies Partner with Symantec to Accelerate ECC Adoption

Symantec has partnered with industry-leading web hosting companies, service providers and browsers to integrate ECC into their IT environments, including Akamai, Citrix, F5, Google, HID Global, Juniper Networks, Opera and Red Hat.

"The future is going to necessitate increasingly higher security cryptography and Akamai sees ECC as a technology that will allow cloud platforms to scale to meet those security demands without the crippling complexity of today's common algorithms," explained Stephen Ludin, chief architect, Akamai Technologies. "It is a significant step forward to better protect our data online in this hyper-connected world. As the Certificate Authority ecosystem for ECC gets ready, we will be building support into the Akamai Intelligent Platform."

"Juniper's SSL VPN solution, #1 in the world market, supports both ECC and DSA algorithms for added security and flexibility. The Junos Pulse SSL VPN client and gateway software are both FIPS compliant," said Michael Callahan, VP of product marketing, Juniper Networks. "We are fully committed to and continue to invest in standards-based security solutions, including the strictest of NIST Suite B standards for our customers, across federal, enterprise and service provider markets."

"F5 helps customers seamlessly combine industry-leading traffic management with security and access solutions, including VPN and SSL encryption capabilities," said Jason Needham, VP of Product Management and Product Marketing, F5 Networks. "One of the primary goals is to give organizations more choice and flexibility in deploying technologies to suit their business needs. F5 is proud to team up with leaders like Symantec to help enterprises and service providers enhance web and mobile security while scaling to better support cloud and BYOD initiatives."

DSA Algorithm Meets U. S. Government Security Requirements

Symantec adds another algorithm to its portfolio by introducing Digital Signature Algorithm (DSA), an additional 2048-bit encryption technology, which is now available in Symantec Managed PKI for SSL solution. DSA delivers the high security and performance to comply with U.S. government standards and allow market access. ECC and DSA are approved by the U.S. government and endorsed by the National Security Agency to meet their protection and compliance requirements.

Recover Costs and Eliminate Expensive Downtime with Powerful New SSL Management Services

The difficulties and complexities, in tracking SSL certificates and staying compliant, increase in tandem with the diversity of networks in large enterprises. A recent Symantec SSL global customer survey(2) of companies using more than 2,000 SSL certificates, reported an average loss of $222,000 last year due to unexpected certificate expiration, rogue certificates, misconfigured certificates, and in some instances lost millions of dollars due to downtime of critical business systems.

Symantec updates its Certificate Intelligence Center cloud service with new management and automation capabilities to manage the certificate lifecycle, from installations, renewals and upgrades to revocation. Other key features include a comprehensive view of a customer's entire SSL portfolio with integrated monitoring, reporting and rating functions. Automation capability is currently scheduled to be available first half of 2013.

Safe Delivery of Trusted Applications

Symantec Secure App Service delivers an industry first in offering a hosted code-signing service for companies and app stores to secure their third-party or company-owned applications. This new cloud-based service assures users the application they are using is trusted and authenticated and has not been maliciously tampered with. For the app developer, the Secure App Service provides full audit and reporting capabilities to track activity for better control and protection. Available today with a SOAP API for integration within the enterprise environment, Secure App Service is scheduled to be available this summer with a full management GUI.

Website Security Solutions Tackle Increased Malvertising Attacks

The increase in malvertisements or malicious ads threatens online businesses and ad networks serving up online ads. According to a recent survey of ad publishers(3), more than 50 percent have experienced at least one malvertising incident in the last twelve months and about 90 percent rate malvertising protection as very important.

Symantec's AdVantage is the company's first advertising and media service to protect web businesses and brand reputations. The secure cloud-based service delivers real-time monitoring, notification and detailed forensics of malvertisement incidents. Ad networks and publishers get immediate insights through visual tracing and comprehensive incident reporting to quickly remediate issues and reduce risk in display advertising.

Partner Quotes on ECC Adoption

"Citrix recognizes that ECC encryption represents the future of SSL encryption," said Steve Shah, Sr. Director, Citrix. "This shift in the cryptographic infrastructure is clearly a next generation approach to the security ecosystem, allowing for better scalability in cloud computing and the supporting infrastructure. Once the certification authority infrastructure is in place, the trend will be clear to follow for networking product groups to make remote datacenters more accessible quickly, even allowing for increasing key sizes and increasing security needs."

"We believe in constantly furthering web security, which is why Chrome supports Elliptic Curve Digital Signature Algorithm (ECDSA) on all modern operating systems," said Adam Langley, software engineer at Google.

"HID Global specializes in security access solutions for the cloud, data and the door, with a comprehensive portfolio incorporating both physical and logical access solutions," said Julian Lovelock, VP of Product Marketing at HID Global. "We're very supportive of the new DSA and ECC algorithm options emerging in the marketplace, and we strongly feel that where the NIST Suite B has drawn up the future of security algorithms, the industry will follow."

"At Opera we are committed to both high quality and security, and we welcome the adoption of new and improved security standards on the web. Elliptic Curve Cryptography provides significant improvements over earlier algorithm standards, and we are delighted to see Symantec support it. Opera's Presto engine added support for ECC in version 395." Source: Security Manager at Opera

"Red Hat and Symantec have long collaborated to bring compelling, secure solutions to our customers," said Bryan Che, Sr. Director Product Management, Red Hat Cloud Business Unit. "We continue to be interested in providing the advantages of increased security and computational efficiency that elliptical curve cryptography (ECC) offers for key management and digital signature, and have been an active participant with Symantec in Project Beacon. Currently, our Red Hat Certificate System supports ECC public-key cryptographic systems and continues to enhance its web browser and operating system ECC support."

AdVantage Customer Quote

"As a leading digital media network in South East Asia, our business depends on protecting our customers, and network of over 10,000 websites, from increasing threats and malvertisements," said Eng Tat, Head of Technology Development, Innity. "Symantec AdVantage provides critical security against the malicious advertisements that can ruin display advertising, damage brand reputation and ultimately, hurt eCommerce businesses."

Resources

Connect with Symantec

About Symantec
Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment - from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

FORWARD-LOOKING STATEMENTS: Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.

(1) Preliminary testing results conducted by Symantec research and development, January 2013

(2) Symantec SSL Management Global Customer Survey, February 2013

(3) Symantec AdVantage Malvertising Survey, September 2012

CONTACT:
Judy Kaneko
Symantec Corp.
(408) 203-0014
Email Contact

Mike Bradshaw
Connect Public Relations
(801) 373-7888
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Cloud Expo Breaking News
The revolution that happened in the server universe over the past 15 years has resulted in an eco-system that is more open, more democratically innovative and produced better results in technically challenging dimensions like scale. The underpinnings of the revolution were common hardware, standards based APIs (ex. POSIX) and a strict adherence to layering and isolation between applications, daemons and kernel drivers/modules which allowed multiple types of development happen in parallel without hindering others. Put simply, today's server model is built on a consistent x86 platform with few surprises in its core components. A kernel abstracts away the platform, so that applications and daemons are decoupled from the hardware. In contrast, networking equipment is still stuck in the mainframe era. Today, networking equipment is a single appliance, including hardware, OS, applications and user interface come as a monolithic entity from a single vendor. Switching between different vendor'...
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuity, speed, mobility, data access and connectivity are staples of the cloud and always will be. But cloud providers that plan to not only exist tomorrow – but to lead – know that security must be the top priority for the cloud and are delivering it now. In his session at 14th Cloud Expo, Kurt Hagerman, Chief Information Security Officer at FireHost, will detail why and how you can have both infrastructure performance and enterprise-grade security – and what tomorrow's cloud provider will look like.
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and organize their digital life through a brand new cloud service, starting from infrastructure to the users’ interface. A revolution that began from inventing and designing our very own infrastructure: we have created the first server network powered solely by ARM CPU. The microservers have “organism-like” features, differentiating them from any of the current technologies. Benefits include low consumption of energy, making Cynny the ecologically friendly alternative for storage as well as cheaper infrastructure, lower running costs, etc.
Cloud backup and recovery services are critical to safeguarding an organization’s data and ensuring business continuity when technical failures and outages occur. With so many choices, how do you find the right provider for your specific needs? In his session at 14th Cloud Expo, Daniel Jacobson, Technology Manager at BUMI, will outline the key factors including backup configurations, proactive monitoring, data restoration, disaster recovery drills, security, compliance and data center resources. Aside from the technical considerations, the secret sauce in identifying the best vendor is the level of focus, expertise and specialization of their engineering team and support group, and how they monitor your day-to-day backups, provide recommendations, and guide you through restores when necessary.
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud. In her session at 14th Cloud Expo, Courtney Behrens, Senior Marketing Manager at Brother International, will discuss how issues that had previously been out of your control, like performance, advanced administration and compliance, can now be put back behind your firewall.
Cloud scalability and performance should be at the heart of every successful Internet venture. The infrastructure needs to be resilient, flexible, and fast – it’s best not to get caught thinking about architecture until the middle of an emergency, when it's too late. In his interactive, no-holds-barred session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will dive into how to design and build-out the right cloud infrastructure.
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and security architects need to continue to develop a deep understanding about API security and how it differs from traditional web application security or mobile application security. In his session at 14th Cloud Expo, Sachin Agarwal, VP of Product Marketing and Strategy at SOA Software, will walk you through the various aspects of how an API could be potentially exploited. He will discuss the necessary best practices to secure your data and enterprise applications while continue continuing to support your business’s digital initiatives.
You use an agile process; your goal is to make your organization more agile. What about your data infrastructure? The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver on new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for application developers and slow performance for end users. Further, as data sizes grow into the Big Data realm, this problem is exacerbated and becomes even more difficult to address. A seemingly simple schema change can take hours (or more) to perform, and as requirements evolve the disconnect between existing data structures and actual needs diverge.
SYS-CON Events announced today that SherWeb, a long-time leading provider of cloud services and Microsoft's 2013 World Hosting Partner of the Year, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. A worldwide hosted services leader ranking in the prestigious North American Deloitte Technology Fast 500TM, and Microsoft's 2013 World Hosting Partner of the Year, SherWeb provides competitive cloud solutions to businesses and partners around the world. Founded in 1998, SherWeb is a privately owned company headquartered in Quebec, Canada. Its service portfolio includes Microsoft Exchange, SharePoint, Lync, Dynamics CRM and more.
The world of cloud and application development is not just for the hardened developer these days. In their session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, will pull back the curtain of the architecture of a fun demo application purpose-built for the cloud. They will focus on demonstrating how they leveraged compute, storage, messaging, and other cloud elements hosted at SoftLayer to lower the effort and difficulty of putting together a useful application. This will be an active demonstration and review of simple command-line tools and resources, so don’t be afraid if you are not a seasoned developer.
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based BUMI (Backup My Info!) is a premium managed service provider specializing in data backup and recovery. Founded in 2002, the company’s Here, There and Everywhere data backup and recovery solutions are utilized by more than 500 businesses. BUMI clients include professional service organizations such as banking, financial, insurance, accounting, hedge funds and law firms. The company is known for its relentless passion for customer service and support, and has won numerous awards, including Customer Service Provider of the Year and 10 Best Companies to Work For.
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected world, the enterprise needs to leverage the capabilities of the web and be ready to innovate without fear of DDoS attacks, concerns about application security and other threats. Organizations face great risk from increasingly frequent and sophisticated attempts to render web properties unavailable, and steal intellectual property or personally identifiable information. Layered security best practices extend security beyond the data center, delivering DDoS protection and maintaining site performance in the face of fast-changing threats.
From data center to cloud to the network. In his session at 3rd SDDC Expo, Raul Martynek, CEO of Net Access, will identify the challenges facing both data center providers and enterprise IT as they relate to cross-platform automation. He will then provide insight into designing, building, securing and managing the technology as an integrated service offering. Topics covered include: High-density data center design Network (and SDN) integration and automation Cloud (and hosting) infrastructure considerations Monitoring and security Management approaches Self-service and automation
In his session at 14th Cloud Expo, David Holmes, Vice President at OutSystems, will demonstrate the immense power that lives at the intersection of mobile apps and cloud application platforms. Attendees will participate in a live demonstration – an enterprise mobile app will be built and changed before their eyes – on their own devices. David Holmes brings over 20 years of high-tech marketing leadership to OutSystems. Prior to joining OutSystems, he was VP of Global Marketing for Damballa, a leading provider of network security solutions. Previously, he was SVP of Global Marketing for Jacada where his branding and positioning expertise helped drive the company from start-up days to a $55 million initial public offering on Nasdaq.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 14th Cloud Expo, Marc Jones, Vice President of Product Innovation for SoftLayer, will explain how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.