Video Screencast Help
Information Unleashed
Showing posts in English
Benjamin Wang | 13 Aug 2014 | 0 comments

Good news! Google’s new search ranking algorithm will look more favorably on websites that use HTTPS by default. The search giant hopes the move will encourage businesses to implement HTTPS encryption. It will be a win for both websites and users, as secure websites will appear higher in Google’s search results while users’ information will be better protected from Wi-Fi network-sniffing attacks.


According to Google, the company is starting to use HTTPS as a “very lightweight” ranking signal for its search engine. While this signal has only affected less than 1% of global queries, Google may give more weight to...

Roxane Divol | 06 Aug 2014 | 0 comments

allseenalliance.pngI’m pleased to announce that Symantec has now added its full weight as a Community Member to the AllSeen Alliance open source consortium – the broadest cross-industry effort to address fundamental use cases, in order to hasten the adoption and availability of the Internet of Everything or Internet of Things (IoT).

Why has Symantec decided to join this initiative? Primarily because an open-source  framework, based on AllJoyn, will enable companies and individuals to create interoperable products that can discover, connect and interact directly with other nearby devices, systems and services, regardless of transport layer, device type, platform, operating system or brand. That includes the mobile devices consumers always have with them; the appliances and...

Cecily Joseph | 25 Jun 2014 | 1 comment

Yesterday, at the Clinton Global Initiative America meeting in Denver, United States Secretary of State Hillary Rodham Clinton, along with Symantec Senior Vice President, Aled Miles, launched our signature Corporate Responsibility program - the Symantec Cyber Career Connection (SC3).


Over the course of 12 months, Symantec worked with a variety of expert stakeholders, including FSG Social Impact Consultants, a steering committee made up of senior executives from a broad array of key Symantec functions (ranging from Government Affairs to Human Resources to our CTO), as well as incorporated feedback from interviews with 36 internal and 31 external stakeholders.

The multi-stage program will help increase the number and caliber of graduates in cyber careers. SC3 is designed to:...

Matt Cain | 23 Jun 2014 | 1 comment


Integrated backup appliances did not exist in the minds of many backup administrators four years ago when Symantec brought an innovative approach to the backup appliance world: a customer-focused strategy designed to reduce complexity in the crucial but often confounding world of data protection.

Yet these appliances - integrating scalable backup and recovery software, optimized storage and data deduplication in one easy to install and manage package –soon were winning the hearts of enterprises around the globe. Symantec customers adopted the new form factor in big numbers because they saw it saving them valuablebudget and resources that could be put to more strategic use. In fact, enterprises working with Symantec reported an average 39% reduction in operational expenditures (OpEx)...

Alix Hart | 19 Jun 2014 | 0 comments

Alix_Head_ShotJuly2013_0.jpegI grew up in a lot of nightclubs.  That may sound strange, but as a kid with a jazz musician father and a singer and DJ as a mother, I spent many nights listening to amazing music from the corners of lounges and nightclubs.  And, I figured out along the way that what really got the house rocking wasn’t just how good the music was.  Rather, it was the ability for the musicians to connect with the audience.  That was where magic happened.   For the audience, it’s the difference between enjoying an evening out to hear some music, and creating a moment that will be remembered for years to come, where all the feeling rushes back to the time you were there.

These days, as a marketer, the tools of the trade are more fragmented and multiplied than ever before –...

Solange Deschatres | 16 Jun 2014 | 0 comments

Although 2011 was first hailed the “Year of the Data Breach,” it appears that was only the beginning. Last year was truly an exceptional year for data breaches, with more data records lost and stolen than ever before. While cyber-espionage and threats to privacy grabbed the headlines, by the end of the year we were faced with the reality that cybercrime remains the most prevalent and a real security threat to businesses. Huge data heists on companies like Target, LivingSocial and AOL, impacted brand reputations, consumer trust and ultimately the bottom line.

In Symantec’s latest Internet Security Threat Report (ISTR), we found the number of data breaches grew 62 percent from 2012, translating to more than 552 million identities exposed last year – an increase of 368 percent. This was also the first year that the top eight data breaches each resulted in the loss of tens of millions of...

Pablo S | 02 Jun 2014 | 0 comments


Backup Exec 2014: “The backup and recovery gold standard”

We are very excited that we announced general availability for Backup Exec 2014 today. This release delivers the protection you need for your virtual and physical environments.

When we began development of Backup Exec 2014, we started by talking to you – our valued customers and partners from all around the world. As a result, this is the release you asked for.

You told us your ideal solution would offer:

  • Powerful backup and restore performance
  • Flexible and broad platform support
  • An easy-to-use user interface and seamless migration capabilities

And, this is what we’ve delivered with Backup Exec 2014. We kept what...

piero_depaoli | 16 May 2014 | 0 comments

With our constant internet usage and plethora of devices, there is more information being generated and shared online than ever before. As a result, the focus of cybercriminals has shifted and antivirus is no longer enough to protect against their sophisticated attacks. Symantec led the first era of security with antivirus, and it continues to be an important part of our portfolio, but the internet security landscape has changed a lot since then, and you must implement more than antivirus to meet the challenges of today’s threats.

AV software, which is used to prevent, detect and remove or disarm malicious computer programs and malware threats, is not sufficient protection on its own because it only protects against the bad software that we already know exists. Essentially, antivirus is only a reactive technology. We have to know about a threat to write a detection for it. So, although AV does a good job of catching new variants of existing threats, it doesn't catch...

Alix Hart | 02 May 2014 | 0 comments

Unilever, PepsiCo, Time Inc. They are all part of my journey as a marketer in big parent companies with multiple, unique brands.  How do you relate parent master brands with their portfolio?  Do you intertwine or keep identities separate? Do you use multiple logos or one identifying image?  It usually comes down to long-term strategy and the brand perceptions you hope to evolve, but they are choices that require intense commitment, because no study can point you to one “right” decision.   And with Symantec, it’s an opportunity like no other.

Symantec has two brands, one identity, and countless opportunities. That is, if we can communicate our unique value - right now - as the partner to turn to for information protection.  Here’s the challenge. Norton, known for security, is a brand with strong awareness with consumers.  Symantec, has less awareness but a solid reputation in information security and management, which is a big opportunity in...

Solange Deschatres | 25 Apr 2014 | 0 comments

This blog was authored by Con Mallon, Sr. Director of Product Management, Mobility Solutions, at Symantec.

Symantec recently published an updated version of Norton Spot in Google Play (US-English only), and with it, turned the traditional Android mobile security model on its head with a new take on how we use our Mobile Insight technology.

Norton Spot is running a beta app that scans for problematic apps before you download them to your device. There are many mobile security products for Android, all of which take a similar approach when it comes to scanning apps for malware and privacy: the customer downloads and installs the app from an app store and at the point of installation, the mobile security product scans the app and notifies the user as to whether it is malicious. There is also a smaller subset of these products, including Norton...