STE WILLIAMS

Integralis Completes Name Change To NTT Com Security

ISMANING, Germany, October 28, 2013 /PRNewswire/ —

NTT Com Security AG, a provider of global information security and risk management solutions, today announced that Integralis has formally changed its name to NTT Com Security [http://www.nttcomsecurity.com ] after the initial intention was announced earlier in June this year.

Today’s news formally confirms that NTT Com Security has replaced Integralis and Secode and that it will continue promoting its portfolio of managed security, business infrastructure, consulting and technology integration services through its WideAngle brand.

This latest move is a natural progression for NTT Com Security to bring both the previous Integralis and Secode organisations within one corporate structure. The name change reflects NTT Com Security’s intention to continue expanding its security capabilities to service global customers, which will mean ongoing investment into products, platforms, services as well as improved career opportunities for its employees. Initial feedback from customers, partners and industry analysts also indicated that this move will help better leverage the strength of NTT’s identity in the global market.

Simon Church, CEO at NTT Com Security, said: “The name change makes good business sense and better aligns us to one of the world’s largest companies and biggest brands. We remain 100% focused on information security and risk management and while other acquisitions throughout our industry have lost some of their identity and expertise, we continue to have the opportunity to become our industry’s next powerhouse. As NTT Com Security, we are able to engage with customers at all levels across the globe to deliver a clear and consistent message that represents the core of the business and the value we can bring to our customers.”

The change in name from Integralis to NTT Com Security does not involve any change in ownership of the organisation. With the exception of setting up NTT Com Security in Japan, there are no management or other operational changes planned. NTT Communications Group still owns approximately 80% of the shares and the listing of NTT Com Security AG (formerly Integralis AG) shares on the German stock exchange will continue.

Akira Arima, CEO at NTT Communications, added: “Naming NTT Com Security as our dedicated security arm will further establish us as a global entity committed to resolving IT challenges faced by today’s businesses. Through the WideAngle brand, we will continue to promote our information security and risk management skills, expertise and services, as well as enhance our Global Cloud Vision to provide secure global cloud services on a seamless, end-to-end basis. ”

Ends

Notes for Editors

About NTT Com Security (formerly Integralis)

NTT Com Security (formerly Integralis) is a global information security and risk management organisation, which delivers a portfolio of managed security, business infrastructure, consulting and technology integration services through its WideAngle brand. NTT Com Security helps organizations lower their IT costs and increase the depth of IT security protection, risk management, compliance and service availability. NTT Com Security AG, is headquartered in Ismaning, Germany and part of the NTT Communications Group, owned by NTT (Nippon Telegraph and Telephone Corporation), one of the largest telecommunications companies in the world. For more information, visit http://www.nttcomsecurity.com.

Article source: http://www.darkreading.com/management/integralis-completes-name-change-to-ntt/240163200

HID Global And Consortium Partners Receive U.S. Cyber Security Grant For Identity Protection Pilot

IRVINE, Calif., October 28, 2013 – HID Global, a worldwide leader in secure identity solutions, today announced that the company and two consortium partners have received one of four U.S. cyber security grants that were recently awarded through President Obama’s National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative. The grants build on the successful launch of five NSTIC pilots awarded in 2012, and will be used to develop systems that enable mobile phones and wearable mobile devices to carry credentials for identification and verification that improve consumer privacy, security and convenience online.

“We are excited to be chosen to help fulfill the NSTIC guiding principles for creating the next generation of identity protection and verification solutions that enable consumers to transact securely and easily over the Internet,” said Jerome Becquart, vice president of Product Marketing, Identity Assurance with HID Global. “Our proposal was selected from a competitive field of more than 70 team- and consortium-based submissions, and we look forward to working alongside Exponent and Gemalto to enable important new solutions that allow mobile phones and wearable devices to be used for online consumer identity and attribute verification.”

The consortium has been named the NSTIC Key Team, and the team’s pilot will be focused on enabling mobile phones and secure wearable devices such as rings or bracelets to be used like smart cards to secure applications and networks for a leading social media company, a health care organization, and the U.S. Department of Defense. Using these mobile device platforms in government applications will also require the ability to produce and store a token associated with a previously used government credential (known as a derived credential) in the device’s secure element, so as not to leverage the previous face-to-face identity-proofing process.

Exponent will provide overall project management leadership for the Key Team, and HID Global will contribute its expertise in mobile and wearable device authentication, credential provisioning and client middleware. The company’s broad portfolio includes authentication and threat detection services; software for smart cards and tokens for strong authentication in both commercial and military applications, and systems for the secure management of smart cards and smart tokens including credentials provisioned in a mobile secure element.

The NSTIC Key Team’s solutions derive from existing and emerging open standards designed to yield an interoperable system that is widely deployable and conducive to participation by a wide variety of solution providers and relying parties. The team will be supported by the Computer Science Department of one of the Nation’s Leading Universities, and Experian Corp, the leading global information services company.

Stay Connected with HID Global

Visit our Media Center, read our Industry Blog, subscribe to our RSS Feed and follow us on Facebook, LinkedIn and Twitter.

About HID Global

HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators and application developers serving a variety of markets. These markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications. The company’s primary brands include ActivID, EasyLobby, FARGO, Codebench, LaserCard and HID. Headquartered in Irvine, California, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com.

Article source: http://www.darkreading.com/privacy/hid-global-and-consortium-partners-recei/240163214

Failure To Deploy: Aided And Abetted By Shelfware

Recent news reports indicate the NSA had acquired technologies to help prevent the leakage of classified data, but failed to deploy them before contractor Edward Snowden began working there. The technologies in question were purchased in the wake of the 2010 WikiLeaks scandal, but went uninstalled at NSA’s Hawaii facility due to what was described as “bandwidth issues.”

The path that allowed Snowden to pilfer large quantities of classified information was paved by the NSA’s failure to deploy the technologies the agency had already acquired and presumably deployed at other facilities. As the technologies sat unused by the Hawaii facility, Snowden was, in essence, aided and abetted by shelfware.

This calls to mind an all-too-common story in many of today’s enterprises when acquired technology is simply not deployed, but sits on the shelf where it may look good — but doesn’t do jack squat. With some technologies, the impact of not having these technologies in place is minimal. But when it comes to safeguarding sensitive data and protecting against inside threats, you could be playing a very high stakes game of chicken. And the consequences of losing the game? Simply disastrous. Just ask the NSA.

But lest I get too dramatic in my oversimplification, shelfware does not always represent a simple failure to deploy. In terms of the inside threat, there are varying levels on the fail scale, each of which we have likely encountered in our own experience. It’s one thing to stick your head in the sand and pretend the threat does not exist. It’s another to courageously acknowledge the threat — but take no action. And it’s something else entirely to face the threat head on, acquire technologies to protect against that threat, and then fail to put the technologies to their most beneficial use.

That said, we all know efforts made in good faith sometimes go awry. The overall initiative to protect against the insider threat may be carefully planned over months or even years, with meaningful requirements established, budgets approved, RFPs released, products evaluated, and, ultimately, dollars spent. But if organizations fail to put the technologies to their most effective use, budget is wasted and, worse yet, sensitive data is put at risk.

While we may not often see instances of blatant shelfware in our own organizations, where acquired products never even see the light of day, most organizations are guilty to some degree of lesser offenses when acquired technologies are not used to their full potential. Failure to make the most of a technology purchase may sound trivial or, at worst, just a sin of omission, but as demonstrated by the NSA’s recent experience, the results can have very serious consequences.

Article source: http://www.darkreading.com/insider-threat/failure-to-deploy-aided-and-abetted-by-s/240163201

NetCitadel And Webroot Partner To Bring Security Intelligence To The Enterprise

MOUNTAIN VIEW, Calif., and BROOMFIELD, Colo. — Oct. 28, 2013 — NetCitadel, Inc., the pioneer in innovative threat management solutions, and Webroot, a leader in cloud-based security intelligence solutions, today announced their partnership to deliver enhanced security intelligence and threat context to enterprises facing sophisticated security attacks and Advanced Persistent Threats (APTs).

The explosion in both volume and sophistication of new malware and APTs has overwhelmed security analysts with alerts from traditional threat detection and enforcement solutions. While next-generation threat detection technologies and traditional SIEM products can generate thousands of security alerts each day, the volume can be overwhelming for IT security teams. These alerts often do not provide sufficient context for security analysts to take immediate action, requiring tedious and time-consuming manual investigation to verify, prioritize and initiate the proper response.

To enable rapid understanding of threats, NetCitadel will now embed Webroot IP Reputation Service into its Threat Management Platform (TMP), providing relevant contextual data such as IP reputation, threat type, and geo-location data for security incidents. NetCitadel customers will gain the benefit of the Webroot Intelligence Networktrade services and its constantly updated data feed on hundreds of millions of IP addresses worldwide to receive the most comprehensive and accurate IP reputation and security intelligence data available today.

“We are pleased to work with NetCitadel to enhance their Threat Management Platform offering for enterprise customers,” said Scott Merkle, VP of Enterprise and OEM Sales at Webroot. “By leveraging Webroot’s dynamic big data analytics and automated machine learning approach to security intelligence, NetCitadel customers will experience dramatic improvements in their security efficacy and marked reductions in the time required to identify new and existing IP threats.”

Webroot IP Reputation Services provide real-time context data for security incidents, including whether a particular IP is malicious and the type of threat. This increases efficiency by significantly reducing the time to manually investigate IP addresses. NetCitadel correlates this information across alerts, adds additional threat context, scores the threat, and presents it to security analysts in a single-pane-of-glass.

“Integrating best-of-breed IP technologies follows our strategy of offering the best solution choices for our customers,” said Neil Stratz, VP of sales and marketing at NetCitadel. “By combining the additional security intelligence from Webroot with NetCitadel’s context-aware platform, security analysts are effectively slamming the door on modern malware and targeted attacks.”

RSA Europe 2013

Webroot will be attending RSA Europe, the premier conference on internet security, from Oct. 29 to 31 in Amsterdam. The company will be available to discuss their strategic partnership with NetCitadel and demo the Webroot Security Intelligence Solutions, including the Webroot IP Reputation Service. In addition, Grayson Milbourne, Webroot’s director of security intelligence, will host a speaking session at the conference on exploring the rapidly evolving world of Android malware, and shed light on the various techniques used to exploit devices using this OS. The session, entitled “Android Malware Exposed – An In-Depth Look At Its Evolution,” will run Thursday, Oct. 31 at 11 a.m. in room G105.

About NetCitadel

NetCitadel was founded by a team of security, networking and virtualization veterans to revolutionize incident response by transforming modern security events into automated actionable intelligence. Headquartered in Mountain View, Calif., the company is venture backed by NEA and other investors. For more information about NetCitadel and its solutions, call (650) 564-4285 or visit http://www.netcitadel.com.

About Webroot

Webroot is bringing the power of software-as-a-service (SaaS) to Internet security worldwide with its suite of Webroot SecureAnywhere solutions for consumers and businesses, and security intelligence solutions for enterprises and technology partners focused on cyber-security. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

Article source: http://www.darkreading.com/management/netcitadel-and-webroot-partner-to-bring/240163216

Centrify Launches Partner Program

San Francisco (Samsung Developers Conference) — Oct. 28, 2013 — Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today announced the Centrify Alliance Partner Program (CAPP), providing developers, cloud and mobile ISVs the ability to jointly develop integrated solutions leveraging Centrify’s leading Unified Identity Services to provide secure access to cloud and mobile apps for mutual customers. In addition, by formalizing its partnering efforts via CAPP, Centrify and its ISV partners such as Dropbox and Zoom are now better able to drive joint go-to-market activities. Centrify is making this announcement from its pavilion at the Samsung Developers Conference, where it is demonstrating how ISVs and mobile application developers can leverage its cloud-based mobile authentication service that has been selected by Samsung as a built-in Zero Sign-on solution for its Samsung KNOX platform.

As Centrify’s business success and solution set have broadened across the data center, cloud, and mobile markets, leading technology companies are approaching Centrify for partnerships to address joint customer demand in the SaaS and mobile management markets. For example, companies such as Dropbox and Box now support the Centrify Mobile Authentication Services (MAS) SDK to provide their customers with Centrify “Zero Sign-on” to their rich mobile apps. There are also more than 2,000 cloud applications integrated with Centrify to provide Single Sign-on (SSO) and role-based access control. This further builds upon Centrify’s OEM relationships with a number of ISV partners who embed Centrify SDKs in their on-premise products for Active Directory enrollment and advanced security and authentication for their products.

“Centrify has long partnered with the world’s leading technology companies, and our new partner program allows more companies and developers to rely on Centrify’s cloud platform to leverage our leading SaaS and mobile security features that provide centrally managed policies to securely access and authenticate users to partners’ leading SaaS applications, regardless of device or location,” said Shreyas Sadalgi, Centrify Vice President of Business Development. “Improved usability with SaaS application Single-Sign-on and mobile app Zero-Sign-on, along with user and mobile device self-service features, enhances security of our partners’ SaaS and mobile solutions by uniquely reducing passwords, securing identity, and authenticating access through Active Directory.”

With the launch of the CAPP, Centrify CAPP partners can now more formally engage with Centrify and leverage its leading cloud and mobile identity solutions, as well as its industry expertise, to jointly develop and deliver integrated solutions for the SaaS and mobile markets, helping partners discover and grow new revenue streams. In addition, CAPP partners have access to Centrify training, licenses and publications; joint development and integration testing; sales and marketing resources; and a wealth of information via Centrify’s secure partner portal. Developers and ISVs can determine their level of involvement through three levels of Centrify CAPP partnerships:

Developer Partner – Centrify provides cloud and mobile application developers with a free, easy-to-deploy solution for integrating their apps with the Active Directory-based Zero Sign-on user experience. Centrify Developer Partners receive discounts on Centrify products, services, and support, and may obtain access to Centrify APIs, including the Centrify Mobile Authentication Services (MAS) SDK for Zero Sign-On to mobile apps. This partner level enables developers and ISVs to redistribute Centrify Zero Sign-on enabled apps with a free usage of the Centrify Cloud Service for up to three mobile apps.

Business Partner – Centrify has SaaS, mobile and Mac solutions that complement the product lines of other software or hardware vendors through various levels of integration, including Single Sign-on and mobile container, application and device management. Centrify works with business partners to implement joint marketing and sales strategies, including opportunities to cross-sell, upsell or promote solutions to Centrify customers.

Premier Partner – Centrify has established strategic partnerships with many of the world’s most innovative and successful technology companies, whose products, experience and expertise complement Centrify business initiatives. Centrify’s premier partners have proven success with cross-selling and recommending Centrify products globally, and this program level is designed to deliver on growth and success objectives with access to Centrify’s customers for mutual benefit.

An example of Centrify’s partnership activities is the licensing of Centrify’s MAS SDK by Samsung for its Samsung KNOX app developer and ISV community. Now available as part of the Samsung KNOX platform as the Samsung KNOX™ Single Sign-on Service Developer Kit, this SDK is now available free of cost to any Samsung developer, and will be demonstrated publicly this week at the Samsung Developers Conference 2013 in Centrify’s exhibit. The Samsung KNOX™ SSO API and SDK comprises SSO classes and methods to utilize the Samsung SSO service in applications designed to work in Samsung KNOX Application Containers on enterprise-managed Samsung mobile devices.

Centrify invites mobile application developers and qualified SaaS and mobile companies to explore how they can jointly work with Centrify to develop integrated mobile and cloud solutions and expand their businesses. For more information on the Centrify CAPP Partner Program, see http://www.centrify.com/capp.

Supporting Quotes

Sudhi Herle, VP of Global Enterprise Products, Samsung Electronics: “Centrify’s unique ‘mobile first’ approach brings a native, rich experience for Zero Sign-on mobile apps. Centrify’s MAS has provided us with an easy-to-use developer kit that helps the Samsung KNOX platform power the next generation of identity centric enterprise mobile apps. We are excited that Centrify is a strategic Samsung KNOX partner to further the adoption of Samsung KNOX and Centrify MAS identity management in the mobile enterprise ecosystem.”

Ari Friedland, Head of Business Development for Dropbox for Business: “We’re excited to partner with Centrify to offer Single Sign-on functionality for Dropbox for Business customers of all sizes across the world. Centrify provides our users with seamless access to their Dropbox for Business accounts on all of their desktop and mobile devices, and Centrify’s tools for Active Directory authentication are a key enabler for adoption of Dropbox for Business.”

Eric Yuan, Founder and CEO of Zoom: “We joined the CAPP to engage more closely with Centrify on sales and marketing initiatives that are key to our goals for driving video collaboration into enterprise accounts. As an emerging leader in cloud meetings, the opportunity to engage with Centrify’s sales, channel, and marketing teams provides a powerful win-win for both companies, and most importantly, gives the best-of-breed solutions to our customers.”

About Centrify
Centrify provides Unified Identity Services across the data center, cloud and mobile that results in one single login for users and one unified identity infrastructure for IT. Centrify’s solutions reduce costs and increase agility and security by leveraging an organization’s existing identity infrastructure to enable centralized authentication, access control, privilege management, policy enforcement and compliance. Centrify customers typically reduce their costs associated with identity lifecycle management and compliance by more than 50 percent. With more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies, Centrify is deployed on more than one million server, application and mobile device resources on-premise and in the cloud. For more information about Centrify and its solutions, call (408) 542-7500, or visit http://www.centrify.com/.

Article source: http://www.darkreading.com/management/centrify-launches-partner-program/240163202

CodeLathe Rolls Out FileCloud 4.0

AUSTIN, Texas (10/28) – CodeLathe, the leader in personal cloud products and services, today launched Tonido FileCloud 4.0, adding new mobile device management (MDM) capabilities, file-change notifications, document preview and advanced administrative and configuration options to its on-premises file sharing and mobile access solution.

The only self-hosted enterprise-grade file sharing and sync solution, Tonido FileCloud puts businesses, schools, ISPs and MSPs in control of their data and infrastructure to ensure complete security and privacy, with the convenience, accessibility and real-time sync of web-based file storage. With this latest update, FileCloud 4.0 gives users even more control and customization options to address mobile device management.

“Unlike other on-premises file storage solutions, FileCloud is designed to meet the mobile accessibility and security needs of the modern business environment with robust apps, and now mobile device management, for iOS, Android and Windows 8,” said Anis Abdul, CTO of CodeLathe. “With FileCloud 4.0, we’ve raised the bar even higher, adding more powerful tools and customization options to streamline the most common administrative tasks.”

The new FileCloud 4.0 now includes:

Mobile Device Management (MDM) that gives administrators real-time visibility into all mobile devices connected to FileCloud, to view data access activity and send push notifications to device owners. Using the FileCloud MDM dashboard, admins can also remotely wipe or block mobile devices to prevent unauthorized access to FileCloud if a device is lost or stolen.

Smart Notifications that alert users in shared folders when files or folders are changed or edited, to keep everyone on the same page with real-time collaboration, consistency and versioning control.

Built-in document preview that enables users to view common file formats, including Word, Excel, PowerPoint, PDF and .txt files, inside a web browser, without the need to download the full files and regardless of the software installed. This allows FileCloud users to share documents with other users running different operating systems and software without any conflict or compatibility issues.

Enhanced administration tools that allow FileCloud admins to customize FileCloud templates, error messages and news feed options with point-and-click ease within the admin user interface dashboard, instead of requiring a configuration file. In addition, admins can see a real-time graphical snapshot of storage capacity, current usage and user activity, as well as add and configure access and security settings for users individually or by uploading a CSV file. Built-in file logging tracks all user-file interactions in a central log file for easy audit reporting.

“FileCloud Version 4.0 is a major milestone for us and the industry. The addition of MDM and remote data wipe capabilities sets a new standard in the market for enterprise-grade cloud storage and sync,” said Madhan Kanagavel, founder and CEO of CodeLathe. “The new MDM capabilities make the solution very attractive to security-conscious enterprises.”

Tonido FileCloud offers the only secure, on-premises file storage and mobile access platform with truly cross-platform compatibility for all mobile devices, as well as any web browser and desktop drive sync. With built-in enterprise-grade security, Active Directory support for user authentication and petascale capability to serve even the largest organizations, FileCloud offers a complete file sharing solution in a single, simple, flexible and affordable solution.

To get started with a free 30-day trial of FileCloud, visit www.getfilecloud.com.

About CodeLathe

CodeLathe, founded in 2008, is a pioneer in personal cloud products and services, offering turnkey personal/private cloud storage and sync solutions to leading mobile carriers, enterprises, network and external storage device makers. CodeLathe’s mission is to enable customers to run their own personal/private clouds and provide a compelling alternative to public online services. Over one million devices run Tonido personal cloud software and a quarter million people use it daily.

Article source: http://www.darkreading.com/mobile/codelathe-rolls-out-filecloud-40/240163217

Slide Show: 10 Free Network Defense Tools

Symantec Reports Second Quarter Fiscal 2014 Results

MOUNTAIN VIEW, CA — (Marketwired) — 10/23/13 — Symantec Corp. (NASDAQ: SYMC) today reported revenue of $1.64 billion for its second quarter of fiscal year 2014, ended September 27, 2013, down 4% year-over-year and down 3% after adjusting for currency.

“Since announcing our strategy in January, we made significant changes that will help us become more successful at delivering value to customers and partners. We’ve reallocated resources to develop new integrated offerings, split the sales organization into renewals and new business teams, and simplified our management structure,” said Steve Bennett, president and chief executive officer, Symantec. “While this was a challenging quarter in our transition year, we expect our actions to translate into growth. We remain committed to our FY15-FY17 targets and are confident that we are on the right track.”

“The actions we took were necessary and will build a strong foundation for long-term growth,” said Drew Del Matto, acting chief financial officer, Symantec. “We fell short on revenue in the September quarter, but over-delivered on operating margin and EPS. Due to the second quarter shortfall and the significant changes we are driving, we are lowering our FY14 guidance.”

GAAP Results for the Second Quarter of Fiscal Year 2014

GAAP operating margin was 15.1 percent compared with 17.5 percent for the same quarter last year.

GAAP net income was $241 million compared with net income of $189 million for the year-ago period.

GAAP diluted earnings per share were $0.34, up 26% year-over-year.

GAAP deferred revenue as of September 27, 2013 was $3.50 billion compared with $3.62 billion as of September 28, 2012, down 3% year-over-year.

Cash flow from operating activities was $191 million, up 7% year-over-year.

Non-GAAP Results for the Second Quarter of Fiscal Year 2014

Non-GAAP operating margin was 27.6 percent compared with 27.0 percent for the same quarter last year, up 60 basis points year-over-year and flat after adjusting for currency.

Non-GAAP net income was $355 million, compared to $318 million for the year-ago period, up 12% year-over-year.

Non-GAAP diluted earnings per share were $0.50, compared with $0.45 for the year-ago period, an increase of 11%.

Business Segment and Geographic Highlights for the Quarter

In alignment with our 4.0 strategy, we created three new business segments. Below is a breakdown of our results by segments and geographies.

The User Productivity Protection segment, which is comprised of endpoint security and management, encryption, and our mobile offerings, represented 44% of total revenue and declined 3% year-over-year (2 percent after adjusting for currency) to $719 million.

The Information Security segment declined 2% year-over-year (1 percent after adjusting for currency) to $316 million. This segment represented 19% of total revenue and includes Symantec’s security capabilities such as our mail web security, authentication services, data center security, Managed Security Services (MSS), hosted security services, and Data Loss Prevention (DLP) businesses.

The Information Management segment represented 37% of total revenue and declined 5% year-over-year (6 percent after adjusting for currency) to $602 million. This segment is comprised of offerings related to backup and recovery, information intelligence, which includes archiving and e-discovery, and information availability, which we previously referred to as storage management.

International revenue represented 52% of total revenue and decreased 3% year-over-year (2 percent after adjusting for currency).

The Europe, Middle East and Africa region represented 28% of total revenue and increased 4% year-over-year (down 1% after adjusting for currency).

The Asia Pacific/Japan region represented 18% of total revenue and increased 14% year-over-year (5 percent after adjusting for currency).

The Americas, including the United States, Latin America and Canada, represented 54% of total revenue and decreased 3% year-over-year (4 percent after adjusting for currency).

Capital Allocation

Symantec ended the quarter with cash, cash equivalents and short-term investments of $3.8 billion compared to $4.0 billion, a decrease of 4% year-over-year. On September 18, 2013, we paid a dividend of $0.15 per share for a total of $105 million. Also, during the quarter, Symantec repurchased 5.0 million shares for $125 million at an average price of $24.99. At the end of the second quarter, Symantec had $908 million remaining for future repurchases in the current board authorized stock repurchase plan.

Symantec’s Board of Directors has declared a quarterly cash dividend of $0.15 per common share to be paid on December 18, 2013to all shareholders of record as of the close of business on November 25, 2013. The ex-dividend date will be November 21, 2013.

Fiscal Year 2014 Guidance

Given the September quarter shortfall and the significant transformation we are driving, we have lowered our annual guidance. For fiscal 2014, Symantec expects:

Revenue to decline 3 to 4% in constant currency

Non-GAAP operating margin to expand by 30 to 60 basis points

Non-GAAP earnings per share to be between -1.0 and 1.5 percent compared to the prior fiscal year

Third Quarter Fiscal Year 2014 Guidance

For the third quarter of fiscal 2014, Symantec expects:

Revenue of $1.63 billion to $1.67 billion, compared to $1.79 billion in the year-ago period.

GAAP operating margin of 17.0 percent to 17.6 percent compared to 17.0 percent in the year-ago period.

Non-GAAP operating margin of 25.6 percent to 26.2 percent compared to 25.9 percent in the year-ago period.

GAAP diluted earnings per share between $0.26 and $0.28 as compared to $0.31 in the year-ago period.

Non-GAAP diluted earnings per share between $0.41 and $0.43 as compared to $0.45 in the year-ago period.

Guidance assumes an exchange rate of $1.35 per Euro for the December 2013 quarter versus the actual weighted average rate of$1.30 and an end of period rate of $1.32 per Euro for the December 2012 quarter. Our guidance assumes an effective tax rate of 28% and a common stock equivalents total for the quarter of approximately 707 million shares.

Conference Call

Symantec has scheduled a conference call for 5 p.m. ET/2 p.m. PT today to discuss the results of its fiscal second quarter 2014, ended September 27, 2013 and to review guidance. Interested parties may access the conference call on the Internet athttp://www.symantec.com/invest. To listen to the live call, please go to the website at least 15 minutes early to register, download and install any necessary audio software. A replay and script of our officers’ remarks will be available on the investor relations’ home page shortly after the call is completed.

About Symantec

Symantec protects the world’s information, and is the global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment — from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our industry-leading expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at:go.symantec.com/socialmedia.

NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

FORWARD-LOOKING STATEMENTS: This press release contains statements regarding our financial and business results, which may be considered forward-looking within the meaning of the U.S. federal securities laws, including projections of future revenue, operating margin and earnings per share, as well as projections of amortization of acquisition-related intangibles and stock-based compensation and restructuring charges. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, levels of activity, performance or achievements to differ materially from results expressed or implied in this press release. Such risk factors include those related to: general economic conditions; maintaining customer and partner relationships; the anticipated growth of certain market segments, particularly with regard to security and storage; the competitive environment in the software industry; changes to operating systems and product strategy by vendors of operating systems; fluctuations in currency exchange rates; the timing and market acceptance of new product releases and upgrades; the successful development of new products and integration of acquired businesses, and the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking statements in this press release. We assume no obligation, and do not intend, to update these forward-looking statements as a result of future events or developments. Additional information concerning these and other risks factors is contained in the Risk Factors sections of our Form 10-K for the year ended March 29, 2013.

USE OF NON-GAAP FINANCIAL INFORMATION: Our results of operations have undergone significant change due to a series of acquisitions, the impact of stock-based compensation, impairment charges and other corporate events. To help our readers understand our past financial performance and our future results, we supplement the financial results that we provide in accordance with generally accepted accounting principles, or GAAP, with non-GAAP financial measures. The method we use to produce non-GAAP results is not computed according to GAAP and may differ from the methods used by other companies. Our non-GAAP results are not meant to be considered in isolation or as a substitute for comparable GAAP measures and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. Our management regularly uses our supplemental non-GAAP financial measures internally to understand, manage and evaluate our business and make operating decisions. These non-GAAP measures are among the primary factors management uses in planning for and forecasting future periods. Investors are encouraged to review the reconciliation of our non-GAAP financial measures to the comparable GAAP results, which is attached to our quarterly earnings release and which can be found, along with other financial information, on the investor relations’ page of our website at www.symantec.com/invest.

Article source: http://www.darkreading.com/symantec-reports-second-quarter-fiscal-2/240163210

WhiteHat Security Launches New Customer Support Portal

SANTA CLARA, Calif., Oct. 24, 2013 /PRNewswire/ — WhiteHat Security, the Web security company, today announced the launch of the company’s new Customer Success Center (CSC). The CSC is WhiteHat Security’s new destination for customers to enter and monitor service inquiries and support cases, as well as access a growing range of resources, including product documentation, technical bulletins, discussion threads, and other resources designed to enable a successful experience with WhiteHat solutions. The CSC can be found at https://support.whitehatsec.com.

“The enhancement of our service delivery capabilities across our solutions, customer success and threat research teams, is an ongoing effort here at WhiteHat Security, and the new Customer Success Center is just the latest step in that process,” said Mark Pecoraro, vice president of customer success at WhiteHat Security. “The CSC provides our customers with a single online destination where they can access their support cases, interact with the WhiteHat user community and educate themselves on the latest developments in Web security.”

From the CSC, customers can log in and track all of their Sentinel support requests and a continuously updated knowledge base complete with onboarding manuals and other pertinent Web security information.

About WhiteHat Security

Founded in 2001 and headquartered in Santa Clara, California, WhiteHat Security provides end-to-end solutions for Web security. The company’s cloud website vulnerability management platform and leading security engineers turn verified security intelligence into actionable insights for customers. Through a combination of core products and strategic partnerships, WhiteHat Security provides complete Web security at a scale and accuracy unmatched in the industry. WhiteHat Sentinel, the company’s flagship product line, currently manages thousands of websites – including sites in highly regulated industries, such as top e-commerce, financial services and healthcare companies. For more information, visit www.whitehatsec.com.

Article source: http://www.darkreading.com/end-user/whitehat-security-launches-new-customer/240163223

DB Networks Introduces Industry’s Behavioral Analysis-Based Core IDS To Detect Advanced And Zero-Day SQL Injection Attacks

SAN DIEGO – Oct. 23, 2013 — DB Networks, an innovator of behavioral analysis in database security, today introduced the IDS-6300 intelligent security appliance, the industry’s first next-generation Core Intrusion Detection System (IDS). The IDS-6300 leverages patented behavioral analysis technology for comprehensive SQL injection intrusion detection and defense – uniquely addressing SQL injection issues that have plagued the industry for more than 15 years. DB Networks’ intelligent security appliance delivers advanced and Zero-Day SQL injection attack detection with the industry’s first Core IDS that combines behavioral analysis and advanced continuous database monitoring, addressing specific compliance requirements within regulations such as PCI DSS, HIPAA, GLBA, and NIST spec 800-53.

SQL injection attacks remain an unsolved threat to enterprise databases and their critical information stored at the core of the network. The Open Web Application Security Project (OWASP) continues to rank SQL injection attacks at the top of its 10 most critical web application risks. Current techniques using signatures and black listing require time-consuming and error-prone manual updating, and are not effective against database hackers who obfuscate their SQL injection using Advanced Evasion Techniques (AET) to conceal their attacks. DB Networks is a pioneer in applying behavioral analysis to identify rogue SQL statements, and today’s launch marks the industry’s first IDS using behavioral analysis in the database tier.

“The way the DB Networks technology analyzes transactions is fundamentally different than a signature based technology so the capacity to identify an anomaly is significantly higher with greater accuracy against false positives,” said David Monahan, Research Director of Security and Risk Management, Enterprise Management Associates, Inc.

In addition to delivering the industry’s most accurate SQL injection attack detection, DB Networks’ new Core IDS solution’s continuous monitoring also adds the unique benefit of database discovery for organizations. Also, its ability to parse and analyze SQL statements offers organizations unique insight into the SQL statements being created by their applications. Coding issues are rapidly identified and traced to their source where they can be remediated.

The IDS-6300 works passively in the core of the IT infrastructure and is operationally transparent. It creates multiple unique models of how an application creates the SQL statements that it sends to the database. All SQL statements are evaluated against these models for proper behavior. Any SQL statement that deviates from these unique models causes the system to alarm in real-time. The behavioral learning and model creation is automated, making it much faster and more accurate than manually generated signatures or the tuning of signatures to suppress false alarms. The IDS-6300 typically takes a day or two to establish all learning and models, while other solutions can take a month or more.

“DB Networks has responded to customer demand to deliver the IDS-6300, building off our pioneering innovations around behavioral analysis at the database tier,” said Brett Helm, CEO of DB Networks. “Today’s launch addresses an unmet need in the industry to identify obfuscated weaponized SQL injection attacks, and is a requirement for organizations to have real-time evaluation of the situation.”

The new solution is delivered in an easy-to-install intelligent security appliance, which is installed on the network connecting the application server to the database server. Typical set up takes less than an hour, and the solution works non-obtrusively off a network tap and doesn’t interfere with existing security infrastructure.

Availability and Pricing

The DB Networks IDS-6300 intelligent security appliance is available today from DB Networks and from authorized resellers. For more information, see www.dbnetworks.com/products/IDS-6300.htm. Pricing starts at $25,000 and goes up depending on capacity needs, with volume discounts available.

About DB Networks

DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack. DB Networks is a privately held company headquartered in San Diego, Calif. For more information, see http://www.dbnetworks.com, or call (800) 598-0450.

Article source: http://www.darkreading.com/db-networks-introduces-industrys-behavio/240163234