Subscribe Now

* You will receive the latest news and updates on the Canadian IT marketplace.

Trending News

Blog Post

Norton updates product portfolio
CLOUD

Norton updates product portfolio 



Robert Reynolds, senior product manager, Norton, explained that the company has spent the past five years investing in protection infrastructure in order to better fight security threats. He noted that Norton’s revamped Internet Security suite is one example of that. Although attacks have grown more sophisticated, Norton has developed an approach to counter them. “Bad guys are trying to hide attacks through zip files and applications,” Reynolds said. “We added an additional layer of reputation scanning for files that come in through new paths, like USBs, zips and apps.” Norton now boasts 65 new sources to trigger reputation lookups. 

The company has also improved its SONAR behavioural engine. Reynolds commented that criminals have determined how to cloak “bad” processes in “good” Windows processes. Malware can now modify a registry and a firewall to send out information through a normal Windows process. Norton has become aware of this new method of attack, and has updated SONAR accordingly. “SONAR can tie bad behaviour across processes, even if it’s a good Windows process,” Reynolds remarked. Norton’s behavioural engine will stop a “good” Windows process from sending out the malware’s information to protect the computer.

Norton’s newest updates also improve on the software’s ability to identify malware and viruses, match them to a solution and repair the damage. “Previous versions of the repair software relied on manual repair,” Reynolds said. Now, Norton takes advantage of the cloud. “We take the information, send it to the cloud, and repair the file with it,” Reynolds commented. “It’s very robust.” 

In addition, Norton has made it easier for customers to protect all of their devices. After a customer enters his or her 360 Multi-Device product key into Norton’s online portal, the website automatically detects which device the user is on. The user will be able to see all of the protected devices, and he or she can easily add devices to be protected. 

Related posts

SECURITY

Norton updates product portfolio 

Robert Reynolds, senior product manager, Norton, explained that the company has spent the past five years investing in protection infrastructure in order to better fight security threats. He noted that Norton’s revamped Internet Security suite is one example of that. Although attacks have grown more sophisticated, Norton has developed an approach to counter them. “Bad guys are trying to hide attacks through zip files and applications,” Reynolds said. “We added an additional layer of reputation scanning for files that come in through new paths, like USBs, zips and apps.” Norton now boasts 65 new sources to trigger reputation lookups. 

The company has also improved its SONAR behavioural engine. Reynolds commented that criminals have determined how to cloak “bad” processes in “good” Windows processes. Malware can now modify a registry and a firewall to send out information through a normal Windows process. Norton has become aware of this new method of attack, and has updated SONAR accordingly. “SONAR can tie bad behaviour across processes, even if it’s a good Windows process,” Reynolds remarked. Norton’s behavioural engine will stop a “good” Windows process from sending out the malware’s information to protect the computer.

Norton’s newest updates also improve on the software’s ability to identify malware and viruses, match them to a solution and repair the damage. “Previous versions of the repair software relied on manual repair,” Reynolds said. Now, Norton takes advantage of the cloud. “We take the information, send it to the cloud, and repair the file with it,” Reynolds commented. “It’s very robust.” 

In addition, Norton has made it easier for customers to protect all of their devices. After a customer enters his or her 360 Multi-Device product key into Norton’s online portal, the website automatically detects which device the user is on. The user will be able to see all of the protected devices, and he or she can easily add devices to be protected.

Related posts