Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Information Unleashed
Showing posts in English
FranRosch | 20 Apr 2012 | 0 comments

Today, the VeriSign seal got a new look and became the new Norton Secured Seal. 

One of the questions we get asked the most is why make this change to one of the most recognized trust marks on the Internet.  Our response, it just makes sense for us and for our customers.  By combining the power of the VeriSign checkmark with the industry’s most respected Norton brand, we are creating the most valued and highly visible security seal on the Internet.  Businesses will experience the same high security standards and protection that was delivered from the previous VeriSign seal.  The rigorous and proven authentication processes ensures their customers and information stays safe and secure.

The Value of a Trust Seal

The Norton Secured Seal is an indispensable tool and is valued by business customers for its proven ability to provide consumers a secure online experience while instilling confidence and trust in their...

Patricia Titus | 17 Apr 2012 | 0 comments

People have the curious ability to get used to almost anything over time. Whether it’s learning to fall asleep to traffic noise or coming to accept wrinkles as we age, we often become comfortable with our situation.

While this adaptability can be a good thing, sometimes it leads to complacency. In the constant fight against cybercrime, for example, becoming comfortable is the last thing people should do. In their quest to steal information, cybercriminals are constantly changing their methods, just like how a human virus evolves in the real world. To keep information safe, we are continuing to evolve new defenses against these attacks. But with so many threats out there – where do you start? Well, don’t try to boil the ocean!

One of the biggest mistakes we see is when organizations secure the endpoint and really lose focus on what really matters, the data! Security means more than protecting your smartphone, laptop or PC. It’s also about the...

Tom Powledge | 12 Apr 2012 | 0 comments

For years businesses have had the desire to adopt new technologies ahead of competitors while avoiding the pains of early adoption of unproven technologies. It’s understandable that we have been hesitant to adopt cloud computing in particular. Many of us have been reluctant to put our business information in the hands of someone else, fearing what would happen in the event of a data breach or outage.

But cloud computing is no longer a new technology full of uncertainty. Many cloud providers have established track records of providing reliable, secure service and high availability, and if you haven’t already, it’s time to take stock of your current IT situation and consider how the cloud can help you....

SeanRegan | 30 Mar 2012 | 0 comments

I continue to be astounded by the sweeping effects of globalization on the world economy. In my current position, I have the opportunity to observe this phenomenon first hand as I visit Symantec customers across the globe. My business travels in far-flung locales frequently remind me of my college study abroad program, which took me to thirteen different countries throughout the world. Bypassing the usual hot spots of France, Italy and Germany I knew I would get to at some point in life, I toured Southeast Asia, South America, central and southern Africa, the Far East, Alaska and the Caribbean. Not only did I have the chance to break down personal cultural barriers and develop an appreciation for different customs, I also acquired an understanding of the legal systems of these nations.  Perhaps my most exciting experience during my travels took...

CJ Desai | 30 Mar 2012 | 0 comments

 

When it comes to protecting your IT resources, endpoint security is a no-brainer. Employing basic protection such as antivirus software has been an integral part of security for so long that endpoint protection seems like one of the few constants in technology.

Except, it isn’t.

Two big trends are changing the way endpoint security is handled. First, the very definition of endpoints is changing. Once the term just meant desktop computers and servers, but it now also encompasses mobile devices such as laptops, smartphones and tablets, as well as virtual servers and desktops – any place corporate data can be accessed. And that data is being stored in more and more places. Gone are the days of a single, fortress-like IT infrastructure protecting all your information...

Symantec Corp. | 09 Mar 2012 | 0 comments

By Anil Chakravarthy, Senior Vice President, Storage and Availability Management Group

Today we announced the latest version of Symantec Data Insight.

Since Symantec acquired Veritas Software in 2004, we’ve had one clear and focused goal – to help our customers manage and protect their information. This is what keeps us up at night.

The creation of Data Insight was a natural innovation and outgrowth of the acquisition. It demonstrates innovation and integration across Symantec’s security and storage portfolio. For those of you not familiar with Data Insight, the solution improves information governance by providing intelligence into ownership and usage of unstructured data – including files such as documents, presentations, spreadsheets and emails.

In order to manage and protect data, organizations need to know what...

Patricia Titus | 01 Mar 2012 | 2 comments

Security leaders have come a long way, from backroom IT gurus to earning a seat at the executive table. Today, boardroom discussions increasingly focus on security threats and risk management and CISOs are being asked by the CEO “How secure is our online e-commerce site?” or “Are we at risk of being attacked by hackers?”

As a security leader, your answer to these questions can determine whether you get the resources and support needed to manage the risks to your organization. Therefore, the ability to answer these kinds of questions in a way that resonates with business executives is critical.

To do this, you cannot rely on the technical dashboards of IT GRC solutions past. While these dashboards allow you to respond to security...

Sean Doherty | 01 Mar 2012 | 1 comment

It’s no secret that information is the prize in today’s war between businesses and cybercriminals. And just when organizations had come to terms with the fortress-style protection needed to keep information safe within the corporate walls, technology evolved to include virtualization and cloud. These advances provide increased business flexibility, improved scalability and can create significant cost savings, but they also increase your exposure to outside threats and therefore drive up risk. And, as if to make matters worse your InfoSec team has to figure out how to keep corporate data safe when it is being accessed out of the office on mobile devices, as well as ensuring the security of the virtualized data center which is highly dynamic in nature.

Symantec is teaming up with the leading virtualization provider VMware, to address some of the most pressing security issues affecting businesses globally as they take the step to virtualize more business critical...

Symantec Corp. | 27 Feb 2012 | 0 comments

By Rowan Trollope, Group President, SMB and Symantec.cloud

Few people wear more hats than the small business owner. One minute you’re a CEO, the next you’re the CFO, and then you’re the HR manager. The last thing you need is to spend time worrying about IT, while you are trying to focus on driving sales.

The technology you use to conduct your daily business is vital to the health of your operation. You may not pay much attention while everything is running smoothly, but when something goes wrong it can mean disaster. One significant data loss incident can ruin your business.

Fortunately, that’s why you take steps to protect your critical information. Except, many SMBs aren’t doing enough. First, they either don’t back up their information at all or fail to do so regularly. A recent Symantec survey showed that less than half of small businesses back up their data at least weekly. And 61 percent lack basic protection...

Symantec Corp. | 21 Feb 2012 | 0 comments

By Patricia Titus, Vice President and Chief Information Security Officer

Everywhere you go these days, you see smartphones and tablets. There’s no question that these incredible devices have transformed our lives and made it easier than ever to conduct business and access corporate information. From accessing email in the airport to video conferencing at home, mobile devices are enabling more people to be more productive in more places.

Mobility Has Become Mainstream

Smartphones – and, to an increasing extent, tablets – have officially arrived as a bona fide business tool. A majority of organizations (59 percent, according to Symantec’s recent State of Mobility Survey) are now making line-of-business apps available remotely. In addition, 71 percent are even considering the creation of a corporate app “store.” Why? It has to do with IT agility. Given the pace of business today, the ability to react quickly...