Kevin Haley – The Unsung Hero For Symantec
Kevin Haley has been associated with Symantec from last ten years now and handles the Product Management for Cyber Security & Response as a Director!
Kevin has strengthened Symantec’s operations and has contributed a lot in the success of channel business strategies.
Security & Response project at Symantec is specifically responsible to keep Symantec geared up with the cyber threat definitions updated almost real time! This could be only possible with timely integration of the logical cure for the entire discovered and reported cyber security threats world-wide! It seems a cumbersome task to organize! That is where the experience & expertise of Kevin Haley comes in Play!
Kevin leads the Symantec’s Global intelligence Network that gathers all these reported cyber security threats via different mediums. With the Intelligence applied by the think tank at Symantec under Kevin’s Supervision, This Global Intelligence Network all these samples are then verified and churned to obtain the threat details. Various analytical factors like GEO, Operating System and hardware configuration plays a vital role in deciding the future of this obtained intelligence.
Read Full News :- Click here
Kevin has strengthened Symantec’s operations and has contributed a lot in the success of channel business strategies.
Security & Response project at Symantec is specifically responsible to keep Symantec geared up with the cyber threat definitions updated almost real time! This could be only possible with timely integration of the logical cure for the entire discovered and reported cyber security threats world-wide! It seems a cumbersome task to organize! That is where the experience & expertise of Kevin Haley comes in Play!
Kevin leads the Symantec’s Global intelligence Network that gathers all these reported cyber security threats via different mediums. With the Intelligence applied by the think tank at Symantec under Kevin’s Supervision, This Global Intelligence Network all these samples are then verified and churned to obtain the threat details. Various analytical factors like GEO, Operating System and hardware configuration plays a vital role in deciding the future of this obtained intelligence.
Read Full News :- Click here
Comments
Post a Comment