Canada Edition 1 Symantec.Pdf

Canada Edition 1 Symantec.Pdf

Ca_096-097 8/26/06 3:53 AM Page 3 Since 1999, Symantec has been led by current RECENT DEVELOPMENTS Symantec has a wide range of CEO John W. Thompson. Under Thompson’s lead- Today, Symantec is one of the educational resources, such ership, Symantec has grown from a small con- fastest growing software com- as: Webcasts, online courses, sumer software publisher to the market leader for panies in North America. articles, podcasts, white papers, security and availability solutions to help cus- Symantec is currently reshaping seminars and events. The tomers manage their rapidly growing digital assets. the competitive landscape and recently launched “Symantec Recognizing the growing importance of infor- is uniquely positioned to drive Yellow Books” are a great edu- mation and the need to protect it, Thompson has industry convergence across the cational tool, as they provide spearheaded company efforts to solidify and expand major security and availability technical know-how to IT pro- its industry-leading security products. This has been segments of the market. fessionals in Symantec’s cus- achieved by developing additional software solu- The new, post-VERITAS– tomer and partner communities tions and acquiring 40 companies, including: merger Symantec will provide — and to the technical market- AXENT Technologies, PowerQuest Corporation, enterprise customers with a more place in general. Written to ON Technology, Brightmail and Sygate. effective way to protect their show how to solve real-world The 2005 merger of Symantec with VERITAS infrastructure, information and business and technical prob- Software (an industry leader in backup and data- interactions. Symantec can now lems using Symantec solutions, protection software) helped establish Symantec as deliver security and availability these books include best- an IT industry powerhouse that ranks as the fourth- solutions across all platforms practice recommendations as largest independent software company in the world. and to customers of all sizes. well as detailed information on installation, configuration and THE PRODUCT PROMOTION product integration. Symantec protects a wide range of customers — Norton’s new consumer mes- Symantec Vision, the com- from consumers to small and mid-sized businesses sage is built around freedom, because that is what pany’s annual premiere global enterprise customer to large enterprises and government organizations. customers value most about their computers and and partner showcase, provides Symantec’s enter- Symantec’s Norton brand of consumer security the Internet. Symantec's value proposition prise stakeholders with an opportunity to make a solutions delivers Internet security and problem- describes the functional and emotional benefits direct and compelling connection with the Symantec solving capabilities to individual users, home customers enjoy when we keep the Norton prom- brand. Attendees have access to a myriad of work- offices and small businesses. The Norton brand of ise: “Use Norton products and services to enjoy shops, seminars and forums that provides them with products is a market leader in desktop protection, your freedom to work and play in the connected a 360-degree understanding and appreciation of world — protected from fear, frus- how Symantec can help provide them with the pro- tration, loss and chaos.” tection they need to be able to do business with con- THREAT RELEASED DECEASED THREAT RELEASED DECEASED THREAT RELEASED DECEASED Backdoor.Hesive.B 2/21/06 2/21/06 W32.Sygyp.A@mm 1/21/06 1/22/06 Bloodhound.Exploit.55 12/20/05 12/21/05 Trojan.Satiloler.D 2/21/06 2/21/06 W32.HLLP.Sality!inf 1/21/06 1/21/06 Trojan.Lodeight.A 12/20/05 12/20/05 Symantec’s consumer marketing fidence. Symantec Vision is replicated, on a smaller Trojan.Meheerwar 2/21/06 2/21/06 PWSteal.Topfox 1/20/06 1/20/06 Trojan.Lodear.G 12/20/05 12/20/05 Linux.Plupii.C 2/19/06 2/19/06 PWSteal.Tarno.R 1/20/06 1/20/06 W32.Beagle.CZ@mm 12/20/05 12/20/05 W32.Beagle.DU 2/18/06 2/18/06 Trojan.Mdropper.E 1/19/06 1/19/06 W32.Dasher.D 12/19/05 12/20/05 efforts have traditionally focused on scale, in countries around the world — helping OSX.Inqtana.A 2/17/06 2/18/06 SymbOS.Sendtool.A 1/18/06 1/19/06 PWSteal.Tarno.Q 12/19/05 12/20/05 W32.Alcra.F 2/17/06 2/17/06 SymbOS.Pbstealer.D 1/18/06 1/19/06 Trojan.Mdropper.D 12/18/05 12/18/05 PWSteal.Metafisher 2/16/06 2/17/06 SymbOS.Bootton.E 1/18/06 1/19/06 SymbOS.Skulls.R 12/16/05 12/16/05 promoting its flagship products, ensure that the company engages its enterprise cus- OSX.Leap.A 2/16/06 2/16/06 PWSteal.Changgame 1/18/06 1/18/06 SymbOS.Cardtrp.P 12/16/05 12/16/05 W32.Beagle.DS@mm 2/15/06 2/16/06 Trojan.PWS.QQPass.H 1/18/06 1/18/06 W32.Beagle.CY@mm 12/16/05 12/17/05 Norton AntiVirus and Norton Inter- tomers and partners wherever they may be. Bloodhound.Exploit.59 2/14/06 2/14/06 W32.Looksky.H@mm 1/17/06 1/18/06 W32.Dasher.C 12/16/05 12/16/05 Linux.Backdoor.Kaiten 2/14/06 2/14/06 W32.Redplut 1/17/06 1/17/06 W32.Dasher.B 12/16/05 12/16/05 Trojan.Satiloler.C 2/14/06 2/14/06 W32.Blackmal.E@mm 1/17/06 1/17/06 Trojan.Swepdat 12/15/05 12/16/05 net Security. Historically, Symantec W32.Exvid.A@mm 2/13/06 2/13/06 W32.Feebs.J@mm 1/16/06 1/16/06 SymbOS.Cardtrp.O 12/15/05 12/15/05 Bloodhound.Exploit.58 2/10/06 2/10/06 Trojan.Tabela.D 1/14/06 1/15/06 Trojan.Lodear.F 12/15/05 12/16/05 Trojan.Goldun.J 2/14/06 2/14/06 Backdoor.Rustock 1/12/06 1/13/06 W32.Beagle.CX@mm 12/15/05 12/15/05 has run its very successful “Back to BRAND VALUES W32.Kedebe.H@mm 2/13/06 2/13/06 W32.Feebs.E@mm 1/12/06 1/12/06 W32.Dasher.A 12/15/05 12/15/05 W32.Beagle.DR@mm 2/13/06 2/13/06 Trojan.Awax 1/13/06 1/13/06 SymbOS.Cardtrp.M 12/14/05 12/15/05 W32.Beagle.DP 2/10/06 2/10/06 W32.Feebs.D@mm 1/11/06 1/11/06 SymbOS.Cardtrp.N 12/14/05 12/15/05 School” and “Tax Time” promotions The company’s commitment to its brand and val- Trojan.Mdropper.FYou 2/10/06 2/11/06 canTrojan.Beagooz.E get 1/11/06 1/11/06almostTrojan.Lodear.E 12/15/05 12/15/05 W32.Beagle.DO@mm 2/10/06 2/10/06 Bloodhound.Exploit.57 1/10/06 1/11/06 SymbOS.Cabir.W 02/15/05 12/15/05 W32.Jalabed@mm 2/8/06 2/9/06 Trojan.Goldun.I 1/6/06 1/6/06 PWSteal.MSNBancos 12/15/05 12/15/05 at retail stores across North ues over its 20-plus-year history has been at the SymbOS.Cardtrp.U 2/8/06 2/9/06 W32.Looksky.G@mm 1/8/06 1/8/06 SymbOS.Doomboot.R 12/15/05 12/15/05 SymbOS.Cardtrp.V 2/8/06anything 2/9/06 W32.Feebs 1/7/06 online. 1/8/06 SymbOS.Skulls.Q 12/14/05 12/15/05 America. However, more recently, heart of its business success. Symantec believes SymbOS.Cardtrp.W 2/8/06 2/9/06 Trojan.Zlob.H 1/6/06 1/6/06 Trojan.Oxtic 12/14/05 12/14/05 SymbOS.Cardtrp.X 2/8/06 2/9/06 W32.Loxbot.D 1/6/06 1/6/06 SymbOS.Cardtrp.I 12/12/05 12/13/05 W32.Kiman.B 2/8/06 2/8/06 W32.Loxbot.C 1/5/06 1/6/06 SymbOS.Skulls.P 12/13/05 12/13/05 Symantec has partnered with other that people should be able to work and play freely Backdoor.Prosti 2/7/06 2/7/06 W32.Looksky.F@mm 1/5/06 1/5/06 Trojan.Zlob.G 12/13/05 12/13/05 W32.Beagle.DN@mm 2/4/06 2/4/06 Trojan.Satiloler.B 1/4/06 1/4/06 SymbOS.Cardtrp.K 12/12/05 12/13/05 SymbOS.Cardtrp.T 2/3/06 2/3/06 SymbOS.Pbstealer.C 1/3/06 1/4/06 SymbOS.Skulls.O 12/13/05 12/13/05 companies in order to create some in a connected world. The brand is more than a Trojan.Mancsyn 2/2/06 2/2/06 PWSteal.Bankash.G 1/3/06 1/3/06 SymbOS.Cardtrp.J 12/12/05 12/13/05 W32.Beagle.DM@mm 2/2/06 2/2/06 W32.Cleevix 1/2/06 1/3/06 SymbOS.Cardtrp.I. 12/12/05 12/13/05 W32.Beagle.DL@mm 2/2/06But 2/2/06 W32.Dabora.B@mm not 12/30/05these. 12/30/05 SymbOS.Cardtrp.L 12/12/05 12/13/05 very exciting and compelling mar- logo or color scheme — it is the combined behav- W32.Kiman.A 2/2/06 2/2/06 Trojan.Spamlia 12/29/05 12/29/05 W32.Dinoxi.B 12/11/05 12/11/05 W32.Loxbot.F 2/1/06 2/1/06 Trojan.Infticker 12/28/05 12/28/05 W32.Dinoxi 12/10/05 12/10/05 keting campaigns.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us