Video Screencast Help
Information Unleashed
Showing posts in English
Tom Powledge | 12 Apr 2012 | 0 comments

For years businesses have had the desire to adopt new technologies ahead of competitors while avoiding the pains of early adoption of unproven technologies. It’s understandable that we have been hesitant to adopt cloud computing in particular. Many of us have been reluctant to put our business information in the hands of someone else, fearing what would happen in the event of a data breach or outage.

But cloud computing is no longer a new technology full of uncertainty. Many cloud providers have established track records of providing reliable, secure service and high availability, and if you haven’t already, it’s time to take stock of your current IT situation and consider how the cloud can help you....

SeanRegan | 30 Mar 2012 | 0 comments

I continue to be astounded by the sweeping effects of globalization on the world economy. In my current position, I have the opportunity to observe this phenomenon first hand as I visit Symantec customers across the globe. My business travels in far-flung locales frequently remind me of my college study abroad program, which took me to thirteen different countries throughout the world. Bypassing the usual hot spots of France, Italy and Germany I knew I would get to at some point in life, I toured Southeast Asia, South America, central and southern Africa, the Far East, Alaska and the Caribbean. Not only did I have the chance to break down personal cultural barriers and develop an appreciation for different customs, I also acquired an understanding of the legal systems of these nations.  Perhaps my most exciting experience during my travels took...

CJ Desai | 30 Mar 2012 | 0 comments

 

When it comes to protecting your IT resources, endpoint security is a no-brainer. Employing basic protection such as antivirus software has been an integral part of security for so long that endpoint protection seems like one of the few constants in technology.

Except, it isn’t.

Two big trends are changing the way endpoint security is handled. First, the very definition of endpoints is changing. Once the term just meant desktop computers and servers, but it now also encompasses mobile devices such as laptops, smartphones and tablets, as well as virtual servers and desktops – any place corporate data can be accessed. And that data is being stored in more and more places. Gone are the days of a single, fortress-like IT infrastructure protecting all your information...

Symantec Corp. | 09 Mar 2012 | 0 comments

By Anil Chakravarthy, Senior Vice President, Storage and Availability Management Group

Today we announced the latest version of Symantec Data Insight.

Since Symantec acquired Veritas Software in 2004, we’ve had one clear and focused goal – to help our customers manage and protect their information. This is what keeps us up at night.

The creation of Data Insight was a natural innovation and outgrowth of the acquisition. It demonstrates innovation and integration across Symantec’s security and storage portfolio. For those of you not familiar with Data Insight, the solution improves information governance by providing intelligence into ownership and usage of unstructured data – including files such as documents, presentations, spreadsheets and emails.

In order to manage and protect data, organizations need to know what...

Patricia Titus | 01 Mar 2012 | 2 comments

Security leaders have come a long way, from backroom IT gurus to earning a seat at the executive table. Today, boardroom discussions increasingly focus on security threats and risk management and CISOs are being asked by the CEO “How secure is our online e-commerce site?” or “Are we at risk of being attacked by hackers?”

As a security leader, your answer to these questions can determine whether you get the resources and support needed to manage the risks to your organization. Therefore, the ability to answer these kinds of questions in a way that resonates with business executives is critical.

To do this, you cannot rely on the technical dashboards of IT GRC solutions past. While these dashboards allow you to respond to security...

Sean Doherty | 01 Mar 2012 | 1 comment

It’s no secret that information is the prize in today’s war between businesses and cybercriminals. And just when organizations had come to terms with the fortress-style protection needed to keep information safe within the corporate walls, technology evolved to include virtualization and cloud. These advances provide increased business flexibility, improved scalability and can create significant cost savings, but they also increase your exposure to outside threats and therefore drive up risk. And, as if to make matters worse your InfoSec team has to figure out how to keep corporate data safe when it is being accessed out of the office on mobile devices, as well as ensuring the security of the virtualized data center which is highly dynamic in nature.

Symantec is teaming up with the leading virtualization provider VMware, to address some of the most pressing security issues affecting businesses globally as they take the step to virtualize more business critical...

Symantec Corp. | 27 Feb 2012 | 0 comments

By Rowan Trollope, Group President, SMB and Symantec.cloud

Few people wear more hats than the small business owner. One minute you’re a CEO, the next you’re the CFO, and then you’re the HR manager. The last thing you need is to spend time worrying about IT, while you are trying to focus on driving sales.

The technology you use to conduct your daily business is vital to the health of your operation. You may not pay much attention while everything is running smoothly, but when something goes wrong it can mean disaster. One significant data loss incident can ruin your business.

Fortunately, that’s why you take steps to protect your critical information. Except, many SMBs aren’t doing enough. First, they either don’t back up their information at all or fail to do so regularly. A recent Symantec survey showed that less than half of small businesses back up their data at least weekly. And 61 percent lack basic protection...

Symantec Corp. | 21 Feb 2012 | 0 comments

By Patricia Titus, Vice President and Chief Information Security Officer

Everywhere you go these days, you see smartphones and tablets. There’s no question that these incredible devices have transformed our lives and made it easier than ever to conduct business and access corporate information. From accessing email in the airport to video conferencing at home, mobile devices are enabling more people to be more productive in more places.

Mobility Has Become Mainstream

Smartphones – and, to an increasing extent, tablets – have officially arrived as a bona fide business tool. A majority of organizations (59 percent, according to Symantec’s recent State of Mobility Survey) are now making line-of-business apps available remotely. In addition, 71 percent are even considering the creation of a corporate app “store.” Why? It has to do with IT agility. Given the pace of business today, the ability to react quickly...

Symantec Corp. | 14 Feb 2012 | 0 comments

Symantec recently filed a patent infringement lawsuit against Acronis and yesterday filed suit against Veeam Software.  Symantec invests deeply in its research and development in order to provide its customers with innovative technologies.  Acronis and Veeam unlawfully leverage Symantec patented technologies in their respective backup and replication products.  This free riding on Symantec is wrong and Symantec has filed these lawsuits to protect its intellectual property.  The filed complaints are provided in the attached documents.

Sean Doherty | 13 Feb 2012 | 0 comments

One hot topic in IT and information security today is the Advanced Persistent Threat, usually abbreviated to APT. However, the P in APT might as well stand for People. And therein lies a clue as to how APTs differ from other targeted attacks, something about which there has been a some confusion.

A standard targeted attack, while often requiring a significant investment of time, does not have dedicated personnel over a long period. If the assets that they are targeting are harder to reach than expected, or pwned asset is removed or patched, then that will often end the attack and another victim selected. Some targeted attacks are even highly automated. In an APT, however, there is someone continually guiding the attack, making adjustments to counter when the victim tries to stop it. It’s very much a person-to-...