|By Marketwired .||
|February 13, 2013 08:00 AM EST||
MOUNTAIN VIEW, CA -- (Marketwire) -- 02/13/13 -- Symantec Corp. (NASDAQ: SYMC) unveiled new updates to its Website Security Solutions portfolio with innovative and comprehensive capabilities to meet the increasing security and performance needs for connected businesses. The WSS strategy focuses on protecting companies, meeting compliance requirements, improving performance and reducing infrastructure costs. The end result is to deliver trusted shopping, trusted advertising and trusted applications for businesses and their customers. The company also announced the first available multi-algorithm SSL certificates with new ECC and DSA options. These offerings will help organizations protect their web eco-systems and strengthen the foundation of trust online.
Read more detailed blog post: Algorithm Agility ECC & DSA Blog
"As companies execute their web strategies, they face increased complexities in protecting their business in a world of Internet-connected things," said Fran Rosch, Vice President Identity and Authentication Services, Symantec. "Website Security Solutions can solve their unique challenges with first-to-market solutions, ECC- and DSA-powered certificates, to secure and accelerate their business."
To stay ahead of new and sophisticated cyber threats, the National Institute of Standards and Technology (NIST) recommends all websites to migrate from RSA 1024-bit to 2048-bit certificates by January 1, 2014. Symantec began transitioning customers to its RSA 2048-bit SSL certificates last year. With today's announcement, the company broadens its SSL portfolio with new security algorithms to address this requirement with increased protection and performance.
ECC Algorithms Faster and Stronger
Symantec is the first CA to offer commercially available SSL certificates using Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA). ECC is currently scheduled to be available in Symantec Managed PKI for SSL first half of 2013. Based on internal testing(1), ECC advancements deliver the following advantages:
- Greater security as Symantec ECC will be 10,000 times harder to break than an RSA 2048-bit key based on industry computation methods. Symantec 256-bit ECC certificates offer the equivalent security of a 3072-bit RSA certificate.
- Improved server performance during peak loads with the ability to process more requests per second with lower CPU utilization, which becomes more important as mobile and tablet adoption place increasing demands on web infrastructure.
- Improved server-to-desktop performance and response time. Internal testing showed a server with an RSA certificate handled 450 requests per second with an average response time of 150 milliseconds to the desktop clients. The server with an ECC certificate under the same conditions netted an average response of just 75 milliseconds.
ECC delivers higher scalability to handle the demands of online interactions across billions of connected endpoints, enabling organizations to make greater gains in their online information sharing, cloud services and global ecommerce initiatives. For end users, improved computational performance and enhanced infrastructure utilization increase their overall productivity for a more favorable experience.
Industry-leading Companies Partner with Symantec to Accelerate ECC Adoption
Symantec has partnered with industry-leading web hosting companies, service providers and browsers to integrate ECC into their IT environments, including Akamai, Citrix, F5, Google, HID Global, Juniper Networks, Opera and Red Hat.
"The future is going to necessitate increasingly higher security cryptography and Akamai sees ECC as a technology that will allow cloud platforms to scale to meet those security demands without the crippling complexity of today's common algorithms," explained Stephen Ludin, chief architect, Akamai Technologies. "It is a significant step forward to better protect our data online in this hyper-connected world. As the Certificate Authority ecosystem for ECC gets ready, we will be building support into the Akamai Intelligent Platform."
"Juniper's SSL VPN solution, #1 in the world market, supports both ECC and DSA algorithms for added security and flexibility. The Junos Pulse SSL VPN client and gateway software are both FIPS compliant," said Michael Callahan, VP of product marketing, Juniper Networks. "We are fully committed to and continue to invest in standards-based security solutions, including the strictest of NIST Suite B standards for our customers, across federal, enterprise and service provider markets."
"F5 helps customers seamlessly combine industry-leading traffic management with security and access solutions, including VPN and SSL encryption capabilities," said Jason Needham, VP of Product Management and Product Marketing, F5 Networks. "One of the primary goals is to give organizations more choice and flexibility in deploying technologies to suit their business needs. F5 is proud to team up with leaders like Symantec to help enterprises and service providers enhance web and mobile security while scaling to better support cloud and BYOD initiatives."
DSA Algorithm Meets U. S. Government Security Requirements
Symantec adds another algorithm to its portfolio by introducing Digital Signature Algorithm (DSA), an additional 2048-bit encryption technology, which is now available in Symantec Managed PKI for SSL solution. DSA delivers the high security and performance to comply with U.S. government standards and allow market access. ECC and DSA are approved by the U.S. government and endorsed by the National Security Agency to meet their protection and compliance requirements.
Recover Costs and Eliminate Expensive Downtime with Powerful New SSL Management Services
The difficulties and complexities, in tracking SSL certificates and staying compliant, increase in tandem with the diversity of networks in large enterprises. A recent Symantec SSL global customer survey(2) of companies using more than 2,000 SSL certificates, reported an average loss of $222,000 last year due to unexpected certificate expiration, rogue certificates, misconfigured certificates, and in some instances lost millions of dollars due to downtime of critical business systems.
Symantec updates its Certificate Intelligence Center cloud service with new management and automation capabilities to manage the certificate lifecycle, from installations, renewals and upgrades to revocation. Other key features include a comprehensive view of a customer's entire SSL portfolio with integrated monitoring, reporting and rating functions. Automation capability is currently scheduled to be available first half of 2013.
Safe Delivery of Trusted Applications
Symantec Secure App Service delivers an industry first in offering a hosted code-signing service for companies and app stores to secure their third-party or company-owned applications. This new cloud-based service assures users the application they are using is trusted and authenticated and has not been maliciously tampered with. For the app developer, the Secure App Service provides full audit and reporting capabilities to track activity for better control and protection. Available today with a SOAP API for integration within the enterprise environment, Secure App Service is scheduled to be available this summer with a full management GUI.
Website Security Solutions Tackle Increased Malvertising Attacks
The increase in malvertisements or malicious ads threatens online businesses and ad networks serving up online ads. According to a recent survey of ad publishers(3), more than 50 percent have experienced at least one malvertising incident in the last twelve months and about 90 percent rate malvertising protection as very important.
Symantec's AdVantage is the company's first advertising and media service to protect web businesses and brand reputations. The secure cloud-based service delivers real-time monitoring, notification and detailed forensics of malvertisement incidents. Ad networks and publishers get immediate insights through visual tracing and comprehensive incident reporting to quickly remediate issues and reduce risk in display advertising.
Partner Quotes on ECC Adoption
"Citrix recognizes that ECC encryption represents the future of SSL encryption," said Steve Shah, Sr. Director, Citrix. "This shift in the cryptographic infrastructure is clearly a next generation approach to the security ecosystem, allowing for better scalability in cloud computing and the supporting infrastructure. Once the certification authority infrastructure is in place, the trend will be clear to follow for networking product groups to make remote datacenters more accessible quickly, even allowing for increasing key sizes and increasing security needs."
"We believe in constantly furthering web security, which is why Chrome supports Elliptic Curve Digital Signature Algorithm (ECDSA) on all modern operating systems," said Adam Langley, software engineer at Google.
"HID Global specializes in security access solutions for the cloud, data and the door, with a comprehensive portfolio incorporating both physical and logical access solutions," said Julian Lovelock, VP of Product Marketing at HID Global. "We're very supportive of the new DSA and ECC algorithm options emerging in the marketplace, and we strongly feel that where the NIST Suite B has drawn up the future of security algorithms, the industry will follow."
"At Opera we are committed to both high quality and security, and we welcome the adoption of new and improved security standards on the web. Elliptic Curve Cryptography provides significant improvements over earlier algorithm standards, and we are delighted to see Symantec support it. Opera's Presto engine added support for ECC in version 395." Source: Security Manager at Opera
"Red Hat and Symantec have long collaborated to bring compelling, secure solutions to our customers," said Bryan Che, Sr. Director Product Management, Red Hat Cloud Business Unit. "We continue to be interested in providing the advantages of increased security and computational efficiency that elliptical curve cryptography (ECC) offers for key management and digital signature, and have been an active participant with Symantec in Project Beacon. Currently, our Red Hat Certificate System supports ECC public-key cryptographic systems and continues to enhance its web browser and operating system ECC support."
AdVantage Customer Quote
"As a leading digital media network in South East Asia, our business depends on protecting our customers, and network of over 10,000 websites, from increasing threats and malvertisements," said Eng Tat, Head of Technology Development, Innity. "Symantec AdVantage provides critical security against the malicious advertisements that can ruin display advertising, damage brand reputation and ultimately, hurt eCommerce businesses."
- Website Security Solutions and Algorithm Agility Press Kit
- SlideShare Presentation: Website Security Solutions
- FAQ: ECC and DSA Certificates Website Security Solutions
- Website Security Solutions
- Symantec Managed PKI for SSL
- Data Sheet: Symantec SSL Certification with the ECC Algorithm
- Data Sheet: Symantec SSL Certificates with the DSA Algorithm
- Algorithm Agility with RSA, ECC and DSA White Paper
- Educational Resources: www.staysecureonline.com
- Symantec Certificate Intelligence Center
- Symantec Secure App Service
- Symantec AdVantage
- Website Security Solutions Partner Program
- SSL Firsts video
- Why Symantec and SSL Overview Video
- Website Security Solutions Blog
- Algorithm Agility ECC & DSA Blog
Connect with Symantec
- Follow Symantec on Twitter
- Join Symantec on Facebook
- View Symantec's SlideShare Channel
- Subscribe to Symantec News RSS Feed
- Visit Symantec Connect Business Community
Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment - from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.
NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
FORWARD-LOOKING STATEMENTS: Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.
(1) Preliminary testing results conducted by Symantec research and development, January 2013
(2) Symantec SSL Management Global Customer Survey, February 2013
(3) Symantec AdVantage Malvertising Survey, September 2012
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Sep. 28, 2016 01:00 AM EDT Reads: 1,555
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Sep. 27, 2016 10:45 PM EDT Reads: 3,400
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 10:30 PM EDT Reads: 2,186
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 27, 2016 09:30 PM EDT Reads: 489
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 27, 2016 09:30 PM EDT Reads: 2,973
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Sep. 27, 2016 08:30 PM EDT Reads: 2,046
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 27, 2016 08:15 PM EDT Reads: 2,237
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 07:00 PM EDT Reads: 2,871
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 27, 2016 06:30 PM EDT Reads: 3,575
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 06:30 PM EDT Reads: 2,214
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 05:45 PM EDT Reads: 1,669
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 05:30 PM EDT Reads: 2,044
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 27, 2016 05:15 PM EDT Reads: 331
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 05:15 PM EDT Reads: 2,778
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 27, 2016 05:00 PM EDT Reads: 1,603
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 27, 2016 03:15 PM EDT Reads: 2,775
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 27, 2016 03:00 PM EDT Reads: 1,699
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 27, 2016 02:45 PM EDT Reads: 1,280
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 27, 2016 01:30 PM EDT Reads: 1,721
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Sep. 27, 2016 01:00 PM EDT Reads: 1,607