{"id":1595,"date":"2010-05-12T00:00:00","date_gmt":"2010-05-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/12\/new-services-could-signal-shift-in-saas-security-offerings\/"},"modified":"2021-12-30T11:39:40","modified_gmt":"2021-12-30T11:39:40","slug":"new-services-could-signal-shift-in-saas-security-offerings","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/12\/new-services-could-signal-shift-in-saas-security-offerings\/","title":{"rendered":"New Services Could Signal Shift In SaaS Security Offerings"},"content":{"rendered":"<p>Two major announcements this week indicate software-as-a-service (SaaS) security offerings are heating up, becoming both more comprehensive and easier to manage, experts say.  Symantec announced its Hosted Endpoint Solution (HEP), a service that will allow small and midsize businesses to manage all of their desktop security clients from a single portal.   The announcement came a day after Verizon Business launched a comprehensive cloud security service, rolling antispam, firewall, intrusion detection, and denial-of-service attack protection into a single service that doesn&#8217;t require on-premise equipment.  &#8220;We aim to have our [cloud] services 30 percent cheaper than our equivalent on-premise services,&#8221; says Cindy Bellefeuille, director of security product management for Verizon Business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Broad cloud security services had to wait on the maturation of security technologies and for demand in the marketplace to grow, observers say.  Meanwhile, more focused security services are springing up to help small and midsize businesses cope with complexity.<\/p>\n<p>&#8220;Security has gotten much more complicated,&#8221; says John Pescatore, vice president of business intelligence firm Gartner.  Another sign of maturity: In the past, the fuzzy status of managed and cloud security services&#8217; compliance to various regulations kept some companies away.  &#8220;A lot of people are attracted to these security-as-a-service offerings because, as part of it, they get the reporting needed by regulations,&#8221; he observes.<\/p>\n<p>Starting in June, the company will offer antivirus, anti-spam, anti-malware, and URL filtering services for no charge to existing Secure Gateway customers.<\/p>\n<p>Where Verizon aims to sell services to enterprises, the goal of Symantec&#8217;s HEP is to ease management of the company&#8217;s endpoint security products for small and midsize businesses.<\/p>\n<p>Large enterprises are not as interested in SaaS offerings because they lose some control and flexibility, says George Tomic, distinguished engineer for Symantec Hosted Services.<\/p>\n<p>http:\/\/www.darkreading.com\/securityservices\/security\/perimeter\/showArticle.jhtml?articleID=224701664<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1595","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1595"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1595\/revisions"}],"predecessor-version":[{"id":4082,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1595\/revisions\/4082"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}