|By Marketwired .||
|February 13, 2013 08:00 AM EST||
MOUNTAIN VIEW, CA -- (Marketwire) -- 02/13/13 -- Symantec Corp. (NASDAQ: SYMC) unveiled new updates to its Website Security Solutions portfolio with innovative and comprehensive capabilities to meet the increasing security and performance needs for connected businesses. The WSS strategy focuses on protecting companies, meeting compliance requirements, improving performance and reducing infrastructure costs. The end result is to deliver trusted shopping, trusted advertising and trusted applications for businesses and their customers. The company also announced the first available multi-algorithm SSL certificates with new ECC and DSA options. These offerings will help organizations protect their web eco-systems and strengthen the foundation of trust online.
Read more detailed blog post: Algorithm Agility ECC & DSA Blog
"As companies execute their web strategies, they face increased complexities in protecting their business in a world of Internet-connected things," said Fran Rosch, Vice President Identity and Authentication Services, Symantec. "Website Security Solutions can solve their unique challenges with first-to-market solutions, ECC- and DSA-powered certificates, to secure and accelerate their business."
To stay ahead of new and sophisticated cyber threats, the National Institute of Standards and Technology (NIST) recommends all websites to migrate from RSA 1024-bit to 2048-bit certificates by January 1, 2014. Symantec began transitioning customers to its RSA 2048-bit SSL certificates last year. With today's announcement, the company broadens its SSL portfolio with new security algorithms to address this requirement with increased protection and performance.
ECC Algorithms Faster and Stronger
Symantec is the first CA to offer commercially available SSL certificates using Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA). ECC is currently scheduled to be available in Symantec Managed PKI for SSL first half of 2013. Based on internal testing(1), ECC advancements deliver the following advantages:
- Greater security as Symantec ECC will be 10,000 times harder to break than an RSA 2048-bit key based on industry computation methods. Symantec 256-bit ECC certificates offer the equivalent security of a 3072-bit RSA certificate.
- Improved server performance during peak loads with the ability to process more requests per second with lower CPU utilization, which becomes more important as mobile and tablet adoption place increasing demands on web infrastructure.
- Improved server-to-desktop performance and response time. Internal testing showed a server with an RSA certificate handled 450 requests per second with an average response time of 150 milliseconds to the desktop clients. The server with an ECC certificate under the same conditions netted an average response of just 75 milliseconds.
ECC delivers higher scalability to handle the demands of online interactions across billions of connected endpoints, enabling organizations to make greater gains in their online information sharing, cloud services and global ecommerce initiatives. For end users, improved computational performance and enhanced infrastructure utilization increase their overall productivity for a more favorable experience.
Industry-leading Companies Partner with Symantec to Accelerate ECC Adoption
Symantec has partnered with industry-leading web hosting companies, service providers and browsers to integrate ECC into their IT environments, including Akamai, Citrix, F5, Google, HID Global, Juniper Networks, Opera and Red Hat.
"The future is going to necessitate increasingly higher security cryptography and Akamai sees ECC as a technology that will allow cloud platforms to scale to meet those security demands without the crippling complexity of today's common algorithms," explained Stephen Ludin, chief architect, Akamai Technologies. "It is a significant step forward to better protect our data online in this hyper-connected world. As the Certificate Authority ecosystem for ECC gets ready, we will be building support into the Akamai Intelligent Platform."
"Juniper's SSL VPN solution, #1 in the world market, supports both ECC and DSA algorithms for added security and flexibility. The Junos Pulse SSL VPN client and gateway software are both FIPS compliant," said Michael Callahan, VP of product marketing, Juniper Networks. "We are fully committed to and continue to invest in standards-based security solutions, including the strictest of NIST Suite B standards for our customers, across federal, enterprise and service provider markets."
"F5 helps customers seamlessly combine industry-leading traffic management with security and access solutions, including VPN and SSL encryption capabilities," said Jason Needham, VP of Product Management and Product Marketing, F5 Networks. "One of the primary goals is to give organizations more choice and flexibility in deploying technologies to suit their business needs. F5 is proud to team up with leaders like Symantec to help enterprises and service providers enhance web and mobile security while scaling to better support cloud and BYOD initiatives."
DSA Algorithm Meets U. S. Government Security Requirements
Symantec adds another algorithm to its portfolio by introducing Digital Signature Algorithm (DSA), an additional 2048-bit encryption technology, which is now available in Symantec Managed PKI for SSL solution. DSA delivers the high security and performance to comply with U.S. government standards and allow market access. ECC and DSA are approved by the U.S. government and endorsed by the National Security Agency to meet their protection and compliance requirements.
Recover Costs and Eliminate Expensive Downtime with Powerful New SSL Management Services
The difficulties and complexities, in tracking SSL certificates and staying compliant, increase in tandem with the diversity of networks in large enterprises. A recent Symantec SSL global customer survey(2) of companies using more than 2,000 SSL certificates, reported an average loss of $222,000 last year due to unexpected certificate expiration, rogue certificates, misconfigured certificates, and in some instances lost millions of dollars due to downtime of critical business systems.
Symantec updates its Certificate Intelligence Center cloud service with new management and automation capabilities to manage the certificate lifecycle, from installations, renewals and upgrades to revocation. Other key features include a comprehensive view of a customer's entire SSL portfolio with integrated monitoring, reporting and rating functions. Automation capability is currently scheduled to be available first half of 2013.
Safe Delivery of Trusted Applications
Symantec Secure App Service delivers an industry first in offering a hosted code-signing service for companies and app stores to secure their third-party or company-owned applications. This new cloud-based service assures users the application they are using is trusted and authenticated and has not been maliciously tampered with. For the app developer, the Secure App Service provides full audit and reporting capabilities to track activity for better control and protection. Available today with a SOAP API for integration within the enterprise environment, Secure App Service is scheduled to be available this summer with a full management GUI.
Website Security Solutions Tackle Increased Malvertising Attacks
The increase in malvertisements or malicious ads threatens online businesses and ad networks serving up online ads. According to a recent survey of ad publishers(3), more than 50 percent have experienced at least one malvertising incident in the last twelve months and about 90 percent rate malvertising protection as very important.
Symantec's AdVantage is the company's first advertising and media service to protect web businesses and brand reputations. The secure cloud-based service delivers real-time monitoring, notification and detailed forensics of malvertisement incidents. Ad networks and publishers get immediate insights through visual tracing and comprehensive incident reporting to quickly remediate issues and reduce risk in display advertising.
Partner Quotes on ECC Adoption
"Citrix recognizes that ECC encryption represents the future of SSL encryption," said Steve Shah, Sr. Director, Citrix. "This shift in the cryptographic infrastructure is clearly a next generation approach to the security ecosystem, allowing for better scalability in cloud computing and the supporting infrastructure. Once the certification authority infrastructure is in place, the trend will be clear to follow for networking product groups to make remote datacenters more accessible quickly, even allowing for increasing key sizes and increasing security needs."
"We believe in constantly furthering web security, which is why Chrome supports Elliptic Curve Digital Signature Algorithm (ECDSA) on all modern operating systems," said Adam Langley, software engineer at Google.
"HID Global specializes in security access solutions for the cloud, data and the door, with a comprehensive portfolio incorporating both physical and logical access solutions," said Julian Lovelock, VP of Product Marketing at HID Global. "We're very supportive of the new DSA and ECC algorithm options emerging in the marketplace, and we strongly feel that where the NIST Suite B has drawn up the future of security algorithms, the industry will follow."
"At Opera we are committed to both high quality and security, and we welcome the adoption of new and improved security standards on the web. Elliptic Curve Cryptography provides significant improvements over earlier algorithm standards, and we are delighted to see Symantec support it. Opera's Presto engine added support for ECC in version 395." Source: Security Manager at Opera
"Red Hat and Symantec have long collaborated to bring compelling, secure solutions to our customers," said Bryan Che, Sr. Director Product Management, Red Hat Cloud Business Unit. "We continue to be interested in providing the advantages of increased security and computational efficiency that elliptical curve cryptography (ECC) offers for key management and digital signature, and have been an active participant with Symantec in Project Beacon. Currently, our Red Hat Certificate System supports ECC public-key cryptographic systems and continues to enhance its web browser and operating system ECC support."
AdVantage Customer Quote
"As a leading digital media network in South East Asia, our business depends on protecting our customers, and network of over 10,000 websites, from increasing threats and malvertisements," said Eng Tat, Head of Technology Development, Innity. "Symantec AdVantage provides critical security against the malicious advertisements that can ruin display advertising, damage brand reputation and ultimately, hurt eCommerce businesses."
- Website Security Solutions and Algorithm Agility Press Kit
- SlideShare Presentation: Website Security Solutions
- FAQ: ECC and DSA Certificates Website Security Solutions
- Website Security Solutions
- Symantec Managed PKI for SSL
- Data Sheet: Symantec SSL Certification with the ECC Algorithm
- Data Sheet: Symantec SSL Certificates with the DSA Algorithm
- Algorithm Agility with RSA, ECC and DSA White Paper
- Educational Resources: www.staysecureonline.com
- Symantec Certificate Intelligence Center
- Symantec Secure App Service
- Symantec AdVantage
- Website Security Solutions Partner Program
- SSL Firsts video
- Why Symantec and SSL Overview Video
- Website Security Solutions Blog
- Algorithm Agility ECC & DSA Blog
Connect with Symantec
- Follow Symantec on Twitter
- Join Symantec on Facebook
- View Symantec's SlideShare Channel
- Subscribe to Symantec News RSS Feed
- Visit Symantec Connect Business Community
Symantec protects the world's information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment - from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.
NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
FORWARD-LOOKING STATEMENTS: Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.
(1) Preliminary testing results conducted by Symantec research and development, January 2013
(2) Symantec SSL Management Global Customer Survey, February 2013
(3) Symantec AdVantage Malvertising Survey, September 2012
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
Nov. 26, 2014 11:45 PM EST Reads: 1,590
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
Nov. 26, 2014 11:30 PM EST Reads: 1,431
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
Nov. 26, 2014 09:00 PM EST Reads: 1,539
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
Nov. 26, 2014 07:00 PM EST Reads: 1,384
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
Nov. 26, 2014 06:00 PM EST Reads: 1,490
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 26, 2014 05:45 PM EST Reads: 1,393
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
Nov. 26, 2014 04:00 PM EST Reads: 1,555
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device experiences grounded in people's real needs and desires.
Nov. 26, 2014 03:45 PM EST Reads: 1,518
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
Nov. 26, 2014 02:00 PM EST Reads: 1,872
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
Nov. 25, 2014 09:30 PM EST Reads: 1,901
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
Nov. 25, 2014 09:30 PM EST Reads: 1,958
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
Nov. 25, 2014 07:00 PM EST Reads: 1,832
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
Nov. 25, 2014 04:30 PM EST Reads: 1,762
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
Nov. 24, 2014 07:00 PM EST Reads: 2,109
Bit6 today issued a challenge to the technology community implementing Web Real Time Communication (WebRTC). To leap beyond WebRTC’s significant limitations and fully leverage its underlying value to accelerate innovation, application developers need to consider the entire communications ecosystem.
Nov. 24, 2014 12:00 PM EST Reads: 1,844
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from hardware to software, or as we like to say, it’s an Internet of many different things. The difference ...
Nov. 24, 2014 11:00 AM EST Reads: 2,216
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.
Nov. 24, 2014 09:00 AM EST Reads: 2,067
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, phone and digital TV services to consumers primarily in rural areas.
Nov. 23, 2014 07:30 PM EST Reads: 2,210
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 23, 2014 12:00 PM EST Reads: 2,157
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com), moderated by Ashar Baig, Research Director, Cloud, at Gigaom Research, Nate Gordon, Director of T...
Nov. 23, 2014 07:45 AM EST Reads: 2,244