Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Symantec's Ubiquity takes broad view of malware

October 5, 2010

Symantec says it has a new method for combatting malware, one that taps into a wider repository of information on potentially malicious code.

The security vendor today announced its new Ubiquity product, which combines data analyzed from the PCs of Symantec customers with Symantec's own Global Intelligence Network to combat new and mutating types of threats.

First featured in Symantec's Norton 2011 security product lineup and in its Hosted Endpoint Protection, Ubiquity is now gearing up for a rollout across a wider range of enterprise products in the coming year, starting with Symantec Web Gateway, the company said.

"By harnessing the anonymous software usage patterns of more than one hundred million customers, Ubiquity allows Symantec to compute a unique safety rating for virtually every software application on the Internet," Stephen Trilling, senior vice president of Security Technology and Response for Symantec, said in a statement. "This gives us the ability to protect our customers against targeted, mutated malware that would otherwise evade traditional virus fingerprints."

Using traditional protection, security companies have to capture and analyze specific types of malware to determine how to defend against them. While some malware strains can hit millions of computers, other strains affect only a small number. Last year, Symantec discovered 240 million unique threat samples on an average of fewer than 20 computers each and many on just a single PC. Analzying every threat, both large and small, puts a strain on traditional malware detection methods.

Employing a different approach, Ubiquity runs a thorough analysis of each infected file to determine its context--where it came from, how old it is, and how widespread it is, and then assigns it a security rating. Cybercriminals can easily change a malware's file contents to sneak past traditional antivirus signatures, but they have less control over the other information that Ubiquity is able to collect, Symantec said.

Ubiquity also tries to cut down on the number of false positives. Beyond storing data on malware, it gathers ratings for just about every legitimate application on the Internet, essentially giving it a huge white list of trusted software and helping it more intelligently figure out which files to block and which to leave alone. Based on anonymous software usage feedback from Symantec customers, Ubiquity's database now contains safety ratings on more than 1.5 billion files, both good and bad, and is adding around 22 million new files each week, according to the company.

Symantec also claims Ubiquity is faster at antivirus scanning than traditional scanners as it looks at only those files identified as risky. Finally, the data offered by Ubiquity can help IT administrators better control which software their users can run and which software is risky and off-limits.

View more news

 
  Most Popular
 
 
  Popular Searches
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html