X hits on this document

PDF document

Symantec enterpriSe Security - page 6 / 97





6 / 97


Symantec Global internet Security threat report


Symantec has established some of the most comprehensive sources of internet threat data in the world through the Symantec™ Global intelligence network. More than 240,000 sensors in over 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec DeepSight™ threat Management System, Symantec Managed Security Services and nortonconsumer products, as well as additional third-party data sources.

Symantec also gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, Symantec’s distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.

Spam and phishing data is captured through a variety of sources including: the Symantec probe network, a system of more than 5 million decoy accounts; MessageLabs intelligence, a respected source of data and analysis for messaging security issues, trends and statistics; and other Symantec technologies. Data is collected in more than 86 countries. Over 8 billion email messages, as well as over 1 billion Web requests, are processed per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors and more than 50 million consumers.

these resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. the result is the Symantec Global Internet Security Threat Report, which gives enterprises and consumers essential information to effectively secure their systems now and into the future.

Symantec Global Internet Security Threat Report now has tweetable stats

  • Click the links wherever this symbol Tweet appears to tweet stats from this report.

  • Follow the #iStr hashtag to particpate in the iStr discussion on twitter.

  • Follow us on twitter @threatintel.

Document info
Document views137
Page views137
Page last viewedSat Oct 22 07:29:20 UTC 2016