{"id":1510,"date":"2006-09-20T00:00:00","date_gmt":"2006-09-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/20\/symantec-prepares-for-shift-to-security-2-0\/"},"modified":"2021-12-30T11:39:30","modified_gmt":"2021-12-30T11:39:30","slug":"symantec-prepares-for-shift-to-security-2-0","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/20\/symantec-prepares-for-shift-to-security-2-0\/","title":{"rendered":"Symantec Prepares For Shift To &#8216;Security 2.0&#8217;"},"content":{"rendered":"<p>As businesses evolve to rely more on the Web, the idea of &#8220;security&#8221; is fast giving way to &#8220;protection&#8221; in the eyes of Symantec Corp.   The company is embarking on a new strategy for helping businesses counter threats to their data and systems, while at the same time making systems available and easy to use for employees and customers, says Symantec CTO Mark Bregman.  More details are expected during an unveiling of Security 2.0 in October.  The strategy also calls for delivering enterprise-quality protection to consumers, including Internet parental control tools and data controls that dictate how personal information is collected and used, Bregman says.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the same time, Symantec wants to help businesses to be more careful about whom they let connect to their networks, the underlying principle of the emerging market for network-access control technology.<\/p>\n<p>Yet as Symantec expands into new areas, and other high-profile vendors like Microsoft and Cisco expand their security offerings, the company could face unprecedented competition.<\/p>\n<p>The company last week announced it&#8217;s teaming with Juniper Networks to build unified threat-management appliances, intrusion detection and prevention systems, and access-management and endpoint-compliance devices based on Juniper hardware and Symantec software.<\/p>\n<p>&#8220;We need to understand all of the risks&#8221; that customers face, &#8220;although we don&#8217;t have to provide a Symantec-branded solution,&#8221; Bregman says.  This sentiment was also evident in Symantec&#8217;s announcement Wednesday with Dell to help midsize businesses get control of their e-mail systems through a new offering called Secure Exchange.<\/p>\n<p>http:\/\/www.informationweek.com\/story\/showArticle.jhtml?articleID=193004118&#038;cid=RSSfeed_IWK_News<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1510","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1510"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1510\/revisions"}],"predecessor-version":[{"id":3997,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1510\/revisions\/3997"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}