Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Information Unleashed
Showing posts in English
Tom Powledge | 01 Feb 2012 | 0 comments

Any knowledgeable entrepreneur would cite innovation as a key to business success in today’s world. And yet innovation means more than simply inventing the next great iPhone app. It can be as simple as implementing an existing idea into the way you do business. The core of innovation is change – being unafraid to look critically at how you do things and see if maybe there’s a better way. Just as evolutionary change keeps organisms one step ahead of the competing species, searching for ways to improve your business can give you an edge over your competitors.

Innovation for your organization might be as simple as identifying and eliminating redundant tasks, or updating elements of your IT infrastructure. In particular, finding a way to do more with less is crucial in today’s sluggish economy. One significant opportunity for innovation...

Brian Dye | 15 Jan 2012 | 0 comments

All around us we see examples of the balance between control and freedom. Too much governmental control means you have little say in your life, but too little results in anarchy. Children need structure to keep from running wild, but provide too much and they fail to develop key social and other life skills.

This same tug-of-war plays out when it comes to managing corporate information. Employees usually want to be able to access information anywhere, on any device, with infinite retention. The business typically wants to keep that information locked down to prevent loss of customer data and resulting brand damage. Legal in many cases wants to minimize information retention to reduce long term liability. Complicating this situation is that all three groups look at “the information” in different ways, and in many cases have poor visibility to the information altogether.

Striking the right balance between freedom and control, between retention and...

Gina Sheibley | 09 Jan 2012 | 2 comments


In 2011, corporate information emerged as the most coveted asset in the cybercrime war, the vast amount of digital information in the world grew even more rapidly and the surge in mobile devices in the workplace added another layer of complexity for IT executives.

So what's next?  I sat down with Francis deSouza, Symantec's Group President of Enterprise Products and Services, to get a sense of the challenges CIOs will face in their quest to keep their information secure and accessible in 2012.  Following is a recap of our discussion including a few key predictions to consider as you plan for the year ahead: 

Question 1:Francis, you spend a lot of time with our customers.  What challenges do they face in the year ahead?

Francis deSouza: As...

Deepak Mohan | 04 Jan 2012 | 11 comments

Explosive information growth is not new news for organizations anymore – it is becoming the norm. The incredible strain this growth puts on infrastructures designed to manage and protect it has been a growing concern for years, though much more accelerated in recent times as virtualization and eDiscovery requirements have pushed this strain to a whole new level.

Symantec is the leader in backup and recovery. As the leader, we focus on addressing the biggest of challenges IT managers face with infrastructures spanning both physical and virtual worlds.

With shrinking IT budgets and growing digital assets, the focus for organizations is naturally on cutting costs without compromising service level agreements. Dealing with multiple point products tends to increase cost and create complexity. Customers of all sizes – from small businesses...

Brian Dye | 16 Dec 2011 | 0 comments

More than ever, archiving is a vital part of how a company manages its information, both to save money on storage and prepare for eDiscovery or other investigations. In the past, most businesses have focused archiving efforts on archiving on-premise data sources, especially email. Organizations today need to archive a large variety of data sources, including email, documents and communications that may reside in the cloud (such as social media content). Organizations are looking for vendors who cannot only archive from the cloud but who offer a choice of deploying the archive itself on-premise, in the cloud or as a hybrid of the two. As such, archiving continues to increase in its importance and is an indispensable tool for information governance as the organization’s information extends beyond the firewall.

Each year Gartner evaluates...

Michael Parker | 22 Nov 2011 | 0 comments

Last year Gartner said that through 2012, “60 percent of virtualized servers will be less secure than the physical servers they replace.” Furthermore, they said that many virtualization initiatives are undertaken without involvement from the information security teams. And just recently, a CSO Flash Poll survey commissioned by Symantec revealed that while 70% of respondents reported that security and compliance concerns have not slowed the pace of virtualization adoption at their organization, 75% indicated that security and compliance are the largest factors in keeping them from full confidence when it comes to hosting business-critical applications on virtualized servers.

So let’s recap: virtualization continues at a rapid pace – even though these implementations are less secure, often without security teams not involved....

Michael Parker | 09 Nov 2011 | 0 comments

Clouds don’t come in a box.

They don’t come pre-installed in a piece of hardware. You don’t just plug it in and – voila – you’ve got cloud! More importantly, you should not have to buy new, expensive hardware to get the benefits of cloud computing. This is one area the consumerization wave won’t be as easily emulated for IT – yet. Specifically, we are used to swapping out our old game station for the latest model. We even do this with our smart phones or tablets. But in the data center, businesses and IT can’t just ‘throw away’ their existing hardware to get the cloud. It’s not good business sense.

At the core of this huge transition to the cloud – both public and private – are the business advantages. Scalability. Agility....

Michael Parker | 26 Oct 2011 | 0 comments

“The son of Stuxnet.”

That is what the news is calling Duqu [dyü-kyü], which Symantec released information about last week.

It would make a great movie, if the ramifications weren’t so serious. Going beyond Stuxent and Duqu, we see the increased opportunity for threats from the cyber world to impact our physical one – moving from espionage to sabotage. These types of attacks are very focused, whether on specific pieces of equipment called controllers, in the case of Stuxnet, or on critical information from suppliers to industrial facilities, like Duqu.

The ability to compromise industrial facilities or the devices within, present...

Reshma Kumar | 13 Oct 2011 | 1 comment

Deepak Mohan, Senior Vice President of the Information Management GroupPosted by Reshma Kumar on behalf of Deepak Mohan.

The following is an excerpt of an interview which was conducted by the CIO Digest's Patrick Spencer with Deepak Mohan, Senior Vice President of the Information Management Group. In the interview, Deepak talks about the pillars of information management, cloud computing, and the drivers of the evolution of information management.

PATRICK: So what are the four pillars of information management?

DEEPAK: We believe that organizations will turn their data stores into strategic assets if they adhere to four...

Michael Parker | 27 Sep 2011 | 0 comments

Have you ever ridden the tube in England? I am always taken with the simple yet effective warning “Mind The Gap” that you see when you step off the tube, which is their subway system, to avoid any potential missteps or injuries.

With that in mind, I’m offering a slight twist on that brilliant phrase when it comes to virtualization – Mind the App. No, I am not talking about the apps you download to your magical devices. I am talking about protecting the status and availability of applications in your virtualized environments.

Why? As I briefly discussed in my last entry, the drivers of virtualization have changed, and application visibility is a critical component for virtualizing business critical applications.