Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Information Unleashed
Showing posts in English
Symantec Corp. | 14 Feb 2012 | 0 comments

Symantec recently filed a patent infringement lawsuit against Acronis and yesterday filed suit against Veeam Software.  Symantec invests deeply in its research and development in order to provide its customers with innovative technologies.  Acronis and Veeam unlawfully leverage Symantec patented technologies in their respective backup and replication products.  This free riding on Symantec is wrong and Symantec has filed these lawsuits to protect its intellectual property.  The filed complaints are provided in the attached documents.

Sean Doherty | 13 Feb 2012 | 0 comments

One hot topic in IT and information security today is the Advanced Persistent Threat, usually abbreviated to APT. However, the P in APT might as well stand for People. And therein lies a clue as to how APTs differ from other targeted attacks, something about which there has been a some confusion.

A standard targeted attack, while often requiring a significant investment of time, does not have dedicated personnel over a long period. If the assets that they are targeting are harder to reach than expected, or pwned asset is removed or patched, then that will often end the attack and another victim selected. Some targeted attacks are even highly automated. In an APT, however, there is someone continually guiding the attack, making adjustments to counter when the victim tries to stop it. It’s very much a person-to-...

Tom Powledge | 01 Feb 2012 | 0 comments

Any knowledgeable entrepreneur would cite innovation as a key to business success in today’s world. And yet innovation means more than simply inventing the next great iPhone app. It can be as simple as implementing an existing idea into the way you do business. The core of innovation is change – being unafraid to look critically at how you do things and see if maybe there’s a better way. Just as evolutionary change keeps organisms one step ahead of the competing species, searching for ways to improve your business can give you an edge over your competitors.

Innovation for your organization might be as simple as identifying and eliminating redundant tasks, or updating elements of your IT infrastructure. In particular, finding a way to do more with less is crucial in today’s sluggish economy. One significant opportunity for innovation...

Brian Dye | 15 Jan 2012 | 0 comments

All around us we see examples of the balance between control and freedom. Too much governmental control means you have little say in your life, but too little results in anarchy. Children need structure to keep from running wild, but provide too much and they fail to develop key social and other life skills.

This same tug-of-war plays out when it comes to managing corporate information. Employees usually want to be able to access information anywhere, on any device, with infinite retention. The business typically wants to keep that information locked down to prevent loss of customer data and resulting brand damage. Legal in many cases wants to minimize information retention to reduce long term liability. Complicating this situation is that all three groups look at “the information” in different ways, and in many cases have poor visibility to the information altogether.

Striking the right balance between freedom and control, between retention and...

Gina Sheibley | 09 Jan 2012 | 2 comments

 

In 2011, corporate information emerged as the most coveted asset in the cybercrime war, the vast amount of digital information in the world grew even more rapidly and the surge in mobile devices in the workplace added another layer of complexity for IT executives.

So what's next?  I sat down with Francis deSouza, Symantec's Group President of Enterprise Products and Services, to get a sense of the challenges CIOs will face in their quest to keep their information secure and accessible in 2012.  Following is a recap of our discussion including a few key predictions to consider as you plan for the year ahead: 

Question 1:Francis, you spend a lot of time with our customers.  What challenges do they face in the year ahead?

Francis deSouza: As...

Deepak Mohan | 04 Jan 2012 | 11 comments

Explosive information growth is not new news for organizations anymore – it is becoming the norm. The incredible strain this growth puts on infrastructures designed to manage and protect it has been a growing concern for years, though much more accelerated in recent times as virtualization and eDiscovery requirements have pushed this strain to a whole new level.

Symantec is the leader in backup and recovery. As the leader, we focus on addressing the biggest of challenges IT managers face with infrastructures spanning both physical and virtual worlds.

With shrinking IT budgets and growing digital assets, the focus for organizations is naturally on cutting costs without compromising service level agreements. Dealing with multiple point products tends to increase cost and create complexity. Customers of all sizes – from small businesses...

Brian Dye | 16 Dec 2011 | 0 comments

More than ever, archiving is a vital part of how a company manages its information, both to save money on storage and prepare for eDiscovery or other investigations. In the past, most businesses have focused archiving efforts on archiving on-premise data sources, especially email. Organizations today need to archive a large variety of data sources, including email, documents and communications that may reside in the cloud (such as social media content). Organizations are looking for vendors who cannot only archive from the cloud but who offer a choice of deploying the archive itself on-premise, in the cloud or as a hybrid of the two. As such, archiving continues to increase in its importance and is an indispensable tool for information governance as the organization’s information extends beyond the firewall.

Each year Gartner evaluates...

Michael Parker | 22 Nov 2011 | 0 comments

Last year Gartner said that through 2012, “60 percent of virtualized servers will be less secure than the physical servers they replace.” Furthermore, they said that many virtualization initiatives are undertaken without involvement from the information security teams. And just recently, a CSO Flash Poll survey commissioned by Symantec revealed that while 70% of respondents reported that security and compliance concerns have not slowed the pace of virtualization adoption at their organization, 75% indicated that security and compliance are the largest factors in keeping them from full confidence when it comes to hosting business-critical applications on virtualized servers.

So let’s recap: virtualization continues at a rapid pace – even though these implementations are less secure, often without security teams not involved....

Michael Parker | 09 Nov 2011 | 0 comments

Clouds don’t come in a box.

They don’t come pre-installed in a piece of hardware. You don’t just plug it in and – voila – you’ve got cloud! More importantly, you should not have to buy new, expensive hardware to get the benefits of cloud computing. This is one area the consumerization wave won’t be as easily emulated for IT – yet. Specifically, we are used to swapping out our old game station for the latest model. We even do this with our smart phones or tablets. But in the data center, businesses and IT can’t just ‘throw away’ their existing hardware to get the cloud. It’s not good business sense.

At the core of this huge transition to the cloud – both public and private – are the business advantages. Scalability. Agility....

Michael Parker | 26 Oct 2011 | 0 comments

“The son of Stuxnet.”

That is what the news is calling Duqu [dyü-kyü], which Symantec released information about last week.

It would make a great movie, if the ramifications weren’t so serious. Going beyond Stuxent and Duqu, we see the increased opportunity for threats from the cyber world to impact our physical one – moving from espionage to sabotage. These types of attacks are very focused, whether on specific pieces of equipment called controllers, in the case of Stuxnet, or on critical information from suppliers to industrial facilities, like Duqu.

The ability to compromise industrial facilities or the devices within, present...