Symantec updates DeepSight service
- 16 January, 2006 12:06
Symantec has updated its DeepSight Threat Management System, making the online security service less expensive and easier to use.
The new release, Version 7.0 of the product, now has a revised user interface, where users will have an easier time getting access to security information, according to Dee Liebenstein, group product manager with Symantec. The company has also simplified the DeepSight search process, she said. "We looked at some of the more common queries and we added quick look-ups for our customers," she said.
And customers will now receive comprehensive threat analysis information on spyware and adware, something that DeepSight did not previously do, she said.
Pricing for the service is being slashed significantly, in hopes of making the service available to a broader range of users. Right now, DeepSight pricing starts at US$14,995 per year, but with version 7.0, that fee will drop to US$9,995 per year, Liebenstein said.
The DeepSight service provides security data that is gathered from Symantec's network of more than 150 million desktop antivirus users and intrusion detection sensors, as well as information stored in the company's large vulnerability database.
For Symantec, the challenge to date has been to winnow down this overwhelming amount of information and provide users with data that is truly relevant to their particular situation, said Andrew Jaquith, senior analyst with Yankee Group Research Inc. "DeepSight has always been a little challenged because the service tends to feel like a 'fun security facts of the day' [service]," he said.
With the new version, however, things have improved, Jaquith said. "They're getting closer to answering the 'so what?' question, which is really the problem that has bedevilled this and other services like it."
One feature that makes DeepSight's information more immediately relevant is a feature called "domain alert." This kind of alert, notifies customers whenever their own Internet domain is named within the payload of malicious code -- something that could, for example, help customers know when their identity is being misrepresented in a phishing attack. "This lets them know, 'this is something that's a bigger risk to you than it is to the guy next door,' " Liebenstein said.