Video Screencast Help
Information Unleashed
Showing posts in English
Pablo S | 02 Jun 2014 | 0 comments


Backup Exec 2014: “The backup and recovery gold standard”

We are very excited that we announced general availability for Backup Exec 2014 today. This release delivers the protection you need for your virtual and physical environments.

When we began development of Backup Exec 2014, we started by talking to you – our valued customers and partners from all around the world. As a result, this is the release you asked for.

You told us your ideal solution would offer:

  • Powerful backup and restore performance
  • Flexible and broad platform support
  • An easy-to-use user interface and seamless migration capabilities

And, this is what we’ve delivered with Backup Exec 2014. We kept what...

FranRosch | 18 Aug 2014 | 0 comments

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.

With that in mind, we at Norton are making significant changes to simplify and strengthen our portfolio of security products. We are making it easier to select and buy the security products you need, and download and maintain them. As cybercriminals and the attacks they launch become more sophisticated, we’re strengthening our advanced threat protection technologies and improving performance across...

Sheila Jordan | 14 Aug 2014 | 0 comments


Those of you who follow Symantec know that we announced our FY15 first quarter earnings last week, delivering solid results with revenue, non-GAAP operating margin and earnings per share above guidance. This steady progress was driven by productivity improvements in both our new business and renewals team. In particular, our federal and renewals teams both delivered one of their best quarters ever.

So, why is this an important topic for IT? It is significant because IT plays an important role in improving product renewals and customer retention for Symantec. It has always been my philosophy that IT should drive increased business productivity and efficiencies, delivering services that help a business grow. At Symantec, that includes improving renewals and retention. 

There are several areas where we are making significant enhancements – they include:

Benjamin Wang | 13 Aug 2014 | 0 comments

Good news! Google’s new search ranking algorithm will look more favorably on websites that use HTTPS by default. The search giant hopes the move will encourage businesses to implement HTTPS encryption. It will be a win for both websites and users, as secure websites will appear higher in Google’s search results while users’ information will be better protected from Wi-Fi network-sniffing attacks.


According to Google, the company is starting to use HTTPS as a “very lightweight” ranking signal for its search engine. While this signal has only affected less than 1% of global queries, Google may give more weight to...

Roxane Divol | 06 Aug 2014 | 0 comments

allseenalliance.pngI’m pleased to announce that Symantec has now added its full weight as a Community Member to the AllSeen Alliance open source consortium – the broadest cross-industry effort to address fundamental use cases, in order to hasten the adoption and availability of the Internet of Everything or Internet of Things (IoT).

Why has Symantec decided to join this initiative? Primarily because an open-source  framework, based on AllJoyn, will enable companies and individuals to create interoperable products that can discover, connect and interact directly with other nearby devices, systems and services, regardless of transport layer, device type, platform, operating system or brand. That includes the mobile devices consumers always have with them; the appliances and...

Cecily Joseph | 25 Jun 2014 | 1 comment

Yesterday, at the Clinton Global Initiative America meeting in Denver, United States Secretary of State Hillary Rodham Clinton, along with Symantec Senior Vice President, Aled Miles, launched our signature Corporate Responsibility program - the Symantec Cyber Career Connection (SC3).


Over the course of 12 months, Symantec worked with a variety of expert stakeholders, including FSG Social Impact Consultants, a steering committee made up of senior executives from a broad array of key Symantec functions (ranging from Government Affairs to Human Resources to our CTO), as well as incorporated feedback from interviews with 36 internal and 31 external stakeholders.

The multi-stage program will help increase the number and caliber of graduates in cyber careers. SC3 is designed to:...

Matt Cain | 23 Jun 2014 | 1 comment


Integrated backup appliances did not exist in the minds of many backup administrators four years ago when Symantec brought an innovative approach to the backup appliance world: a customer-focused strategy designed to reduce complexity in the crucial but often confounding world of data protection.

Yet these appliances - integrating scalable backup and recovery software, optimized storage and data deduplication in one easy to install and manage package –soon were winning the hearts of enterprises around the globe. Symantec customers adopted the new form factor in big numbers because they saw it saving them valuablebudget and resources that could be put to more strategic use. In fact, enterprises working with Symantec reported an average 39% reduction in operational expenditures (OpEx)...

Alix Hart | 19 Jun 2014 | 0 comments

Alix_Head_ShotJuly2013_0.jpegI grew up in a lot of nightclubs.  That may sound strange, but as a kid with a jazz musician father and a singer and DJ as a mother, I spent many nights listening to amazing music from the corners of lounges and nightclubs.  And, I figured out along the way that what really got the house rocking wasn’t just how good the music was.  Rather, it was the ability for the musicians to connect with the audience.  That was where magic happened.   For the audience, it’s the difference between enjoying an evening out to hear some music, and creating a moment that will be remembered for years to come, where all the feeling rushes back to the time you were there.

These days, as a marketer, the tools of the trade are more fragmented and multiplied than ever before –...

Solange Deschatres | 16 Jun 2014 | 0 comments

Although 2011 was first hailed the “Year of the Data Breach,” it appears that was only the beginning. Last year was truly an exceptional year for data breaches, with more data records lost and stolen than ever before. While cyber-espionage and threats to privacy grabbed the headlines, by the end of the year we were faced with the reality that cybercrime remains the most prevalent and a real security threat to businesses. Huge data heists on companies like Target, LivingSocial and AOL, impacted brand reputations, consumer trust and ultimately the bottom line.

In Symantec’s latest Internet Security Threat Report (ISTR), we found the number of data breaches grew 62 percent from 2012, translating to more than 552 million identities exposed last year – an increase of 368 percent. This was also the first year that the top eight data breaches each resulted in the loss of tens of millions of...

piero_depaoli | 16 May 2014 | 0 comments

With our constant internet usage and plethora of devices, there is more information being generated and shared online than ever before. As a result, the focus of cybercriminals has shifted and antivirus is no longer enough to protect against their sophisticated attacks. Symantec led the first era of security with antivirus, and it continues to be an important part of our portfolio, but the internet security landscape has changed a lot since then, and you must implement more than antivirus to meet the challenges of today’s threats.

AV software, which is used to prevent, detect and remove or disarm malicious computer programs and malware threats, is not sufficient protection on its own because it only protects against the bad software that we already know exists. Essentially, antivirus is only a reactive technology. We have to know about a threat to write a detection for it. So, although AV does a good job of catching new variants of existing threats, it doesn't catch...