Video Screencast Help

Information Unleashed

Showing posts in English
fdesouza | 21 Feb 2012 | 0 comments

 

One of about the things I enjoy most in my role is the opportunity to engage with our customers about the challenges they're facing on a daily basis.  Over the past few months they have raised a number of issues that mirror what we are seeing on a macro level.  While trends like cloud, virtualization and mobility offer great promise, companies around the world are struggling with the new challenges they present. 

And all too often, companies are afraid to take advantage of opportunities in front of them.  The same innovations that offer such promise also create risk and complexity.  

That's why protection is such a powerful thing.  It gives you the confidence to be bold and take calculated risks.  And that confidence is important in a world that is radically changing for companies today.  

To enable our customers to take advantages of the opportunities brought on by things like big data and...

Symantec Corp. | 14 Feb 2012 | 0 comments

Symantec recently filed a patent infringement lawsuit against Acronis and yesterday filed suit against Veeam Software.  Symantec invests deeply in its research and development in order to provide its customers with innovative technologies.  Acronis and Veeam unlawfully leverage Symantec patented technologies in their respective backup and replication products.  This free riding on Symantec is wrong and Symantec has filed these lawsuits to protect its intellectual property.  The filed complaints are provided in the attached documents.

Sean Doherty | 13 Feb 2012 | 0 comments

One hot topic in IT and information security today is the Advanced Persistent Threat, usually abbreviated to APT. However, the P in APT might as well stand for People. And therein lies a clue as to how APTs differ from other targeted attacks, something about which there has been a some confusion.

A standard targeted attack, while often requiring a significant investment of time, does not have dedicated personnel over a long period. If the assets that they are targeting are harder to reach than expected, or pwned asset is removed or patched, then that will often end the attack and another victim selected. Some targeted attacks are even highly automated. In an APT, however, there is someone continually guiding the attack, making adjustments to counter when the victim tries to stop it. It’s very much a person-to-...

fdesouza | 05 Feb 2012 | 0 comments

The State of Enterprise Backup

According to IDC, the volume of digital content is expected to grow to 2.7 zettabytes (ZB) in 2012. That's a 48 percent increase from 2011.

And while information volumes are skyrocketing, our customers' IT budgets are not keeping pace.  In fact, in many cases they may be shrinking this year.  Today's on-demand mentality and 24/7 business model also means their users want instant access to their data and applications. 

Our customers are under tremendous pressure to protect more information with fewer resources, while meeting tighter SLAs.  In fact, a recent Symantec survey of more than 1,400 IT professionals worldwide found that49 percent of respondents could not meet SLAs due to too much data.

Virtualization is also creating new complexity and additional...

Tom Powledge | 01 Feb 2012 | 0 comments

Any knowledgeable entrepreneur would cite innovation as a key to business success in today’s world. And yet innovation means more than simply inventing the next great iPhone app. It can be as simple as implementing an existing idea into the way you do business. The core of innovation is change – being unafraid to look critically at how you do things and see if maybe there’s a better way. Just as evolutionary change keeps organisms one step ahead of the competing species, searching for ways to improve your business can give you an edge over your competitors.

Innovation for your organization might be as simple as identifying and eliminating redundant tasks, or updating elements of your IT infrastructure. In particular, finding a way to do more with less is crucial in today’s sluggish economy. One significant opportunity for innovation...

Brian Dye | 15 Jan 2012 | 0 comments

All around us we see examples of the balance between control and freedom. Too much governmental control means you have little say in your life, but too little results in anarchy. Children need structure to keep from running wild, but provide too much and they fail to develop key social and other life skills.

This same tug-of-war plays out when it comes to managing corporate information. Employees usually want to be able to access information anywhere, on any device, with infinite retention. The business typically wants to keep that information locked down to prevent loss of customer data and resulting brand damage. Legal in many cases wants to minimize information retention to reduce long term liability. Complicating this situation is that all three groups look at “the information” in different ways, and in many cases have poor visibility to the information altogether.

Striking the right balance between freedom and control, between retention and...

Gina Sheibley | 09 Jan 2012 | 2 comments

 

In 2011, corporate information emerged as the most coveted asset in the cybercrime war, the vast amount of digital information in the world grew even more rapidly and the surge in mobile devices in the workplace added another layer of complexity for IT executives.

So what's next?  I sat down with Francis deSouza, Symantec's Group President of Enterprise Products and Services, to get a sense of the challenges CIOs will face in their quest to keep their information secure and accessible in 2012.  Following is a recap of our discussion including a few key predictions to consider as you plan for the year ahead: 

Question 1:Francis, you spend a lot of time with our customers.  What challenges do they face in the year ahead?

Francis deSouza: As...

Deepak Mohan | 04 Jan 2012 | 11 comments

Explosive information growth is not new news for organizations anymore – it is becoming the norm. The incredible strain this growth puts on infrastructures designed to manage and protect it has been a growing concern for years, though much more accelerated in recent times as virtualization and eDiscovery requirements have pushed this strain to a whole new level.

Symantec is the leader in backup and recovery. As the leader, we focus on addressing the biggest of challenges IT managers face with infrastructures spanning both physical and virtual worlds.

With shrinking IT budgets and growing digital assets, the focus for organizations is naturally on cutting costs without compromising service level agreements. Dealing with multiple point products tends to increase cost and create complexity. Customers of all sizes – from small businesses...

Brian Dye | 16 Dec 2011 | 0 comments

More than ever, archiving is a vital part of how a company manages its information, both to save money on storage and prepare for eDiscovery or other investigations. In the past, most businesses have focused archiving efforts on archiving on-premise data sources, especially email. Organizations today need to archive a large variety of data sources, including email, documents and communications that may reside in the cloud (such as social media content). Organizations are looking for vendors who cannot only archive from the cloud but who offer a choice of deploying the archive itself on-premise, in the cloud or as a hybrid of the two. As such, archiving continues to increase in its importance and is an indispensable tool for information governance as the organization’s information extends beyond the firewall.

Each year Gartner evaluates...

fdesouza | 07 Dec 2011 | 1 comment

In today’s business world, information is as valuable as cash. In fact, industrial espionage costs U.S. businesses more than $250 billion each year. This has organizations scrambling to shore up their defenses against all manner of outside attacks.  At the same time, companies of all sizes may be neglecting one of the most important perpetrators of intellectual property (IP) theft: their employees.

In order to assess this often underrated threat, Symantec asked forensic psychologists Eric D. Shaw and Harley V. Stock to examine various factors leading to insider IP theft. While most research is put into the development of technology-based security measures, their white paper focuses on the behavioral and environmental issues that can lead to theft of corporate data.

Who Is the Typical IP Thief, and What Are They Stealing?...