360 Score: 3.17
(10 Reviews)
For Vendors

SYMANTEC CORPORATION in Industrial Control Systems Security Solutions

  • California, USA
  • 1982
  • $1BN to $5BN
Sectors
Manufacturing, Transportation and Logistics, Energy and Utilities
Regions
Europe, Middle East and Africa, Asia-Pacific, Latin America, North America
3.17
For Buyers
 
Company Overview

The company provides ICS security solutions for both operators to secure their plants and infrastructure, as well as, for equipment vendors to increase the security of their products. Symantec’s Critical System Protection (SCSP) helps plant/infrastructure operators protect their equipment from sophisticated attacks. SCSP offers robust, signature-less, and host-based protection in managed and unmanaged scenarios, without compromising the device’s performance to manufacturers and asset owners of embedded systems. Some of the key features of SCSP are application whitelisting, application specific network firewall controls, integrated host-based firewall, USB device whitelisting, auto-sandboxing, anti-exploit mitigation techniques, and deep application discovery.

Symantec Critical System Protection

Symantec Critical System Protection 5.2.6 implements adaptable controls against the known and obscure vulnerabilities affecting one’s basic framework. The administration support empowers executives to arrange and keep up security strategies, oversee clients and jobs, see cautions, and run reports crosswise over heterogeneous working frameworks. Basic System Protection offers adaptable server security that controls client and application practices, squares unseemly system traffic and occasions, and provides non-signature strategy based ways to deal with suit server outstanding burdens dependent on an assortment of server profiles. Framework conduct can be constrained by counteracting explicit activities that an application or client may take and reviewing framework forms, documents, log information, and basic settings for unseemly movement. Basic System Protection encourages meeting consistence necessities by conveying complete review proof by means of combined occasion logs, investigation, and revealing.

 

Improved Host Protection

  • System and device controls lock down configuration settings, file systems, and prevent installation and execution of unauthorized executables
  • Zero-Day protection against known and unknown attacks without the need for signature updates
  • Out-of-the-box OS hardening via standard policies that ensure an enhanced level of security to the OS

 

High Performance Operation

  • Modular Policy Architecture reduces lengthy rules processing
  • Adaptive risk profile protection allows flexible policy enforcement based on server types
  • Prevent unauthorized user access and application downloads

 

Granular Controls across Diverse Server Environments

  • Broad platform coverage includes Windows®, Solaris®, Linux®, AIX®, HP-UX®, VMware (console OS and guest VMs), and Virtual Agent for unsupported/less common platforms

 

Easy Policy-based Deployment and Administration

  • Automate responses to events with multiple actions and countermeasures including console alerts, e-mail, SNMP trap, disabling the user account, and executing a command or event logging
  • Expand detection policies via the console, allowing more detection rules with fewer policies and edits
  • Quickly enforce restrictions to enforce security policies before patches exist or have been deployed

 

Policy Viewer

  • Provides detailed information on HIDS/HIPS policies

Benefits: – Quick assessment of system policies and settings

 

HIDS Policy Enhancements for Windows

  • Reorganized per operating system environment to enhance modularity
  • New detections of SQL injection, directory traversal, vulnerable CGI scripts, blacklist IP, malicious strings, and SEP actions

Benefits: – Easier PCI file integrity and user monitoring

 

File Monitoring Enhancements for Windows

  • Monitor ACL’s in file attributes
  • Intelligent real-time file hashing (FIPS 180-2)
  • Track username and processes associated with file modification within HIDS

Benefits: – Better performance with no polling interval hashing and more granular file integrity monitoring

 

Unicode Log Monitoring for Windows

Benefits: – Improved log monitoring for critical applications

 

PCI Policy Guidelines

  • Targeted for PCI requirements 10.3, 10.5, and 11.5 for monitoring files, configurations, and users

Benefits: – Reduced complexity for PCI compliance

 

HIPS Enhancements

  • Control over outsourced and remote administrators
  • Multiple custom IPS policies per agent
  • Enhanced GUI options for policies

Benefits: – Easier management of multi-tier prevention policies

 

Windows XPe Agent Support

Benefits: – Extends detection and prevention capabilities (especially for PCI requirements) to embedded systems such as retail PoS and medical devices

 

USP

Symantec provides ICS security solutions for both, operators to secure their plants and infrastructure as well as equipment vendors to increase the security of their products. Symantec’s Critical System Protection (SCSP) helps plant/infrastructure operators protect their equipment from sophisticated attacks. SCSP offers robust, signature-less, and host-based protection in managed and unmanaged scenarios, without compromising the device’s performance. Some of the key features of SCSP are application whitelisting, application specific network firewall controls, integrated host-based firewall, USB device whitelisting, auto-sandboxing, anti-exploit mitigation techniques, and deep application discovery.

SYMANTEC CORPORATION Popular Comparisons
Evaluated against 457 key buying criteria
Strengths
  • As a Service
  • Module Based
  • Outcome Based
  • Per Node/Asset
  • Per User
  • Regulatory compliance
  • IOC detection tools
  • Network traffic anomaly detection tools
  • Education & Training
  • Incident Response
  • Managed Security Services
  • Support & Maintenance
  • Risk Based Asset Classification
  • Risk/VaR Simulation
  • Software Enabled Methodology
  • Cloud
  • Hybrid
  • On-premise
  • Cyber attack simulation
  • Design & Integration
Weaknesses
  • No Weaknesses

Reviews

Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
(*)(*)( )( )( )2

“Asset Management and its advantage"

Symantec offers Asset Management Suite that helps organizations ensure compliance of IT assets.
External,
External,
(*)(*)(*)(*)(*)5

“Consumer's data protection"

Symantec’s Security Response can discover cybercriminals hijacking consumer connected devices and home networks to carry out Distributed Denial of Service (DDoS) attacks on more profitable targets.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
(*)(*)(*)( )( )3

“Protection of antimalware"

The protection of antimalware increases with the advanced machine learning and neural network technologies of Symantec. No internet connections are required for its functioning. It uses plug and play solutions to minimize false positives and blocks malwares.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
(*)(*)( )( )( )2

“Securing Multiple Networks"

Security of the industrial environment against various threats and attacks is a major challenge. End users must secure multiple networks.
External,
External,
(*)(*)(*)(*)( )4

“Amazing Solution for protecting ICS endpoint"

Rockwell Automation partnered with Symantec Corporation to address the risk to computer-based endpoints in automation systems. Rockwell Automation tested Critical System Protection (CSP) solution for protecting its ICS host endpoints. The CSP solution provides policy-based behavior control and detection for hosts/devices.
  • Previous
  • 1
  • Next
Questions And Answers
Have a Question? Ask here.
No Questions
No Photos / Videos
#1 Development Tools / Network traffic anomaly detection tools
#2 Distributed Denial Of Service / Deep packet inspection
#3 Pre Deployment / Regulatory compliance
#4 Antivirus/Malware / Device Control
#5 Antivirus/Malware / Cross-platform protection
#1 Asset visibility and safety / Real-time monitoring
#2 Regulatory compliance for ICS
#3 Minimize risk - backup and recovery
#4 Integration of legacy devices
#5 Increased productivity / improve system performance

SYMANTEC CORPORATION QUADRANTS

SYMANTEC CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

  • Niche Quadrant

    All-Asia-Pacific

  • Niche Quadrant

    All-Europe