{"id":1462,"date":"2006-01-20T00:00:00","date_gmt":"2006-01-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/20\/symantec-to-fortify-its-compliance-software\/"},"modified":"2021-12-30T11:39:26","modified_gmt":"2021-12-30T11:39:26","slug":"symantec-to-fortify-its-compliance-software","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/20\/symantec-to-fortify-its-compliance-software\/","title":{"rendered":"Symantec to Fortify its Compliance Software"},"content":{"rendered":"<p>Security vendor Symantec will unveil new policy and compliance software next month as part of its integration of the BindView assets, internetnews.com has learned.  The move comes after Symantec agreed to acquire BindView in October for $209 million in a bid to offer a more comprehensive security and policy compliance for customers.  The Cupertino, Calif., company has tucked BindView&#8217;s assets into its portfolio and will unveil them as the Symantec Policy Manager and Symantec Compliance Manager in early February, said a source close to the company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Servers that have the host-based security agent on them are usually the most cooperative servers,&#8221; Pescatore said. &#8220;They&#8217;re the least the likely to go wrong. Where the security problems come from are rogue servers that pop up on the network that are not in the right configuration.&#8221;   &#8220;So, if you&#8217;re only an agent-based solution, you&#8217;ll never see them. You&#8217;re only looking at what you&#8217;re controlling. That definitely fills a hole and they had to have it. ESM had hit that wall.&#8221; <\/p>\n<p>ESM&#8217;s architecture was host-based, meaning it deployed agents, or software code that monitors, manages and reports on each machine&#8217;s status on a network.  The software then checks the system information against assessment templates for government regulations like Sarbanes-Oxley and Health Insurance Portability and Accountability (HIPAA).  Although these agents ensure that a computer has the latest patches and current user permissions, they also must be installed on every computer in the enterprise.<\/p>\n<p>The company makes agent-less security management products based on credentialed access, considered ideal for automating security and policy compliance management on computers throughout an enterprise, regardless of where the machines operate.  Symantec has said it will sell the BindView assets alongside ESM to give customers the choice of agent-based or agent-less security software, but analysts think the clock is ticking for architectures like ESM.<\/p>\n<p>Many customers are clamoring for the credentialed access, he said, noting that agent-based solutions like ESM are both expensive and time-consuming because the agent has to be installed on every single thing on the network.<\/p>\n<p>Mike Rothman, founder of new security research firm Security Incite, said that Symantec has to figure out what to do with ESM now that is has a more modern policy management software in place.  &#8220;But again the mentality of buying BindView was to get that functionality but with an up-to-date and strategic architecture.&#8221;  Rothman also noted Symantec isn&#8217;t the only company to make such a play, choosing to buy a company with market traction and a healthy install base to sink its teeth into the market.<\/p>\n<p>http:\/\/www.internetnews.com\/security\/article.php\/3579076<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1462","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1462"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1462\/revisions"}],"predecessor-version":[{"id":3949,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1462\/revisions\/3949"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}