Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Symantec Updates Compliance Suite To Provide Improved Visibility and Control of IT Risks

Symantec today introduced the next version of its Symantec Control Compliance Suite, the company’s solution designed to address IT risk and compliance challenges.

New features in Symantec Control Compliance Suite 10.5 help organizations better manage IT risk while achieving a more holistic view of risk across their IT infrastructure. The latest release also continues to provide support for the latest regulatory and security standards and further expands upon integrated native assessment capabilities.

Symantec today introduced the next version of its Symantec Control Compliance Suite, the company’s solution designed to address IT risk and compliance challenges.

New features in Symantec Control Compliance Suite 10.5 help organizations better manage IT risk while achieving a more holistic view of risk across their IT infrastructure. The latest release also continues to provide support for the latest regulatory and security standards and further expands upon integrated native assessment capabilities.

A surprisingly high, 80 percent of organizations have poor visibility into their IT risk, taking three to nine months or longer to classify their IT risk levels, according to a recent report from The IT Policy Compliance Group.

“Organizations with the best insight into IT risks have the ability to sort through thousands of IT issues on a daily basis and prioritize remediation efforts to focus on protecting their most critical assets and data first,” notes Jim Hurley, managing director of the IT Policy Compliance Group.

The latest version of Control Compliance Suite expands upon Symantec’s prioritized approach to managing IT risks with built-in support for the new Security Content Automation Protocol (SCAP) benchmarks and deeper integration with Symantec Data Loss Prevention. SCAP (Developed by the National Institute of Standards and Technology), provides organizations with a standardized approach to writing security checks and reporting on configuration and vulnerability information across multiple vendors’ solutions. This common framework facilitates a shared view of IT risks allowing organizations to more quickly prioritize and remediate the most important issues found.

New workflow integration with Symantec Data Loss Prevention allows organizations to automatically target security awareness training at individuals who have violated data protection policies. Summary pages from these questionnaires deliver an overview of where key security awareness risks are, and have the ability to drill down into more detail to assist in remediation efforts.

Previous releases provided the ability to integrate data from Symantec Data Loss Prevention as well as third party applications such as firewalls, event management systems and vulnerability management solutions. The newest version of Symantec Control Compliance Suite expands upon this capability with new out-of-the-box connectors to automatically collect security awareness survey results from the Symantec Control Compliance Suite Response Assessment Manager. For example, a business unit manager can now view a Symantec Data Loss Prevention policy violation alongside results of who passed security awareness training and information on the compliance posture of servers hosting his most critical data.

Symantec Control Compliance Suite has built-in content covering multiple IT control frameworks and regulations, coupled with automatic updates to help ensure controls assessments are based on the latest standards, including support for PCI 2.0 and the new SCAP benchmarks.

Advertisement. Scroll to continue reading.

This latest release also broadens technical control assessment capabilities to include Federal Desktop Core Configuration Standard (FDCC) support for desktops and Open Web Application Security Project (OWASP) support for Web applications. FDCC helps protect desktops against harmful configuration changes and vulnerabilities while OWASP delivers a technical security standard for web applications by focusing on the top 10 most common vulnerabilities.

According to Gary Davis, Manager of McAfee’s Risk & Compliance portfolio of products and a SecurityWeek contributor, “You need to be able to see everything that contributes to the risk equation: threats, asset criticality, vulnerabilities and in-place countermeasures. Effective risk management depends on real-time, end-to-end knowledge of everything in the risk equation. Only when you have this visibility can your company begin to effectively understand risk and optimize security controls to mitigate it,” Davis writes.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.