Welcome!

News Feed Item

Norton Bolsters Small Business Cybersecurity Protection; Secures Multiple Devices in Minutes

Symantec (Nasdaq:SYMC) today introduced Norton Small Business, a cybersecurity solution customized to help support and protect small businesses with fewer than 20 employees with a flexible subscription model that makes it easy to add or transfer licenses.

Businesses today rely on multiple computers and smartphones to conduct business and access information. This free flow of information has created tremendous opportunity for small businesses and the cybercriminals who target them. Across the U.S., approximately 20 million small businesses with fewer than 20 employees2 face increasingly complex security challenges and need simple, easy-to-use information security and management solutions.

“According to the Symantec Internet Security Threat Report, small businesses were targeted in 30 percent of all cyberattacks3 in 2013. While the risks are real, small business owners with fewer than 20 employees often wear multiple hats and don’t have the time or resources to manage IT needs,” said Brian Burch, vice president, Global Consumer and Small Business Marketing. “Running a small business is hard work, but Symantec wants to make securing it the easy part.”

Flexible Multi-Device Protection in Minutes

Norton Small Business builds upon Symantec’s proven multi-layer protection technologies, while adding small business features to enhance ease of use and management. Like the award-winning Norton consumer offerings, Norton Small Business delivers much more than basic antivirus. Today’s small businesses need the powerful layers of protection in Norton Small Business to stay safe from today’s threats. Key features and benefits include:

  • Advanced cybersecurity – Powered by Symantec Insight and SONAR behavior-based technology, small businesses stay safe with always-on protection and a 100 percent virus removal assurance – or your money back. Norton Small Business features proprietary Norton Mobile Insight app-scanning technology as well as remote locate, lock and wipe capabilities to help manage lost or stolen devices.
  • Flexible, right-for-me protection Norton Small Business offers a subscription model to make it easy to add or transfer licenses based on changing business needs.
  • Multi-device protection – Protects multiple business and employee devices including PCs, Macs, Android™ smartphones and tablets, iPhones® and iPads®.
  • Enhanced support for small businesses – Allows employees to use Norton support directly and reach live agents without having to rely on business owners for troubleshooting.
  • Fast – A guided start tool allows small businesses to deliver protection to all devices with a single email.
  • Easy management – The web-based management portal makes it fast and easy to monitor and manage devices, ensuring protection levels across the business are current.

Scalable Offering, Pricing and Availability

Norton Small Business offers a flexible subscription model that allows small businesses to easily add and transfer licenses between devices. The MSRP is $99 annually to protect five devices; $199 annually to protect 10 devices; and $399 annually to protect 20 devices. Business owners can add licenses to protect each additional computer, smartphone or tablet for $20 annually. As additional devices are added, pricing is pro-rated to reflect the annual subscription period.

Norton Small Business is available for purchase where small businesses prefer to shop: online, in retail stores and through value-added resellers. Small businesses can immediately find Norton Small Business in the Norton online store and through select online retailers including Amazon.com, Staples.com, NewEgg.com, OfficeDepot.com, OfficeMax.com and Fry's Electronics. It will also be available in Staples, Office Depot and Office Max retail stores this spring.

About Symantec

Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia.

NOTE TO U.S. EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

FORWARD-LOOKING STATEMENTS: Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.

1 100% virus removal assurance includes pro-rated money-back guarantee based on the total price paid and is limited to virus removal services for computers (PCs & Macs) only through the duration of the current paid subscription period. See norton.com/guarantee for details.

2 Dun & Bradstreet, Inc.

3 Symantec Internet Security Threat Report (2014)

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...