Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
Deepak Mohan | 04 Jan 2012 | 11 comments

Explosive information growth is not new news for organizations anymore – it is becoming the norm. The incredible strain this growth puts on infrastructures designed to manage and protect it has been a growing concern for years, though much more accelerated in recent times as virtualization and eDiscovery requirements have pushed this strain to a whole new level.

Symantec is the leader in backup and recovery. As the leader, we focus on addressing the biggest of challenges IT managers face with infrastructures spanning both physical and virtual worlds.

With shrinking IT budgets and growing digital assets, the focus for organizations is naturally on cutting costs without compromising service level agreements. Dealing with multiple point products tends to increase cost and create complexity. Customers of all sizes – from small businesses...

Brian Dye | 16 Dec 2011 | 0 comments

More than ever, archiving is a vital part of how a company manages its information, both to save money on storage and prepare for eDiscovery or other investigations. In the past, most businesses have focused archiving efforts on archiving on-premise data sources, especially email. Organizations today need to archive a large variety of data sources, including email, documents and communications that may reside in the cloud (such as social media content). Organizations are looking for vendors who cannot only archive from the cloud but who offer a choice of deploying the archive itself on-premise, in the cloud or as a hybrid of the two. As such, archiving continues to increase in its importance and is an indispensable tool for information governance as the organization’s information extends beyond the firewall.

Each year Gartner evaluates...

Michael Parker | 22 Nov 2011 | 0 comments

Last year Gartner said that through 2012, “60 percent of virtualized servers will be less secure than the physical servers they replace.” Furthermore, they said that many virtualization initiatives are undertaken without involvement from the information security teams. And just recently, a CSO Flash Poll survey commissioned by Symantec revealed that while 70% of respondents reported that security and compliance concerns have not slowed the pace of virtualization adoption at their organization, 75% indicated that security and compliance are the largest factors in keeping them from full confidence when it comes to hosting business-critical applications on virtualized servers.

So let’s recap: virtualization continues at a rapid pace – even though these implementations are less secure, often without security teams not involved....

Michael Parker | 09 Nov 2011 | 0 comments

Clouds don’t come in a box.

They don’t come pre-installed in a piece of hardware. You don’t just plug it in and – voila – you’ve got cloud! More importantly, you should not have to buy new, expensive hardware to get the benefits of cloud computing. This is one area the consumerization wave won’t be as easily emulated for IT – yet. Specifically, we are used to swapping out our old game station for the latest model. We even do this with our smart phones or tablets. But in the data center, businesses and IT can’t just ‘throw away’ their existing hardware to get the cloud. It’s not good business sense.

At the core of this huge transition to the cloud – both public and private – are the business advantages. Scalability. Agility....

Michael Parker | 26 Oct 2011 | 0 comments

“The son of Stuxnet.”

That is what the news is calling Duqu [dyü-kyü], which Symantec released information about last week.

It would make a great movie, if the ramifications weren’t so serious. Going beyond Stuxent and Duqu, we see the increased opportunity for threats from the cyber world to impact our physical one – moving from espionage to sabotage. These types of attacks are very focused, whether on specific pieces of equipment called controllers, in the case of Stuxnet, or on critical information from suppliers to industrial facilities, like Duqu.

The ability to compromise industrial facilities or the devices within, present...

Reshma Kumar | 13 Oct 2011 | 1 comment

Deepak Mohan, Senior Vice President of the Information Management GroupPosted by Reshma Kumar on behalf of Deepak Mohan.

The following is an excerpt of an interview which was conducted by the CIO Digest's Patrick Spencer with Deepak Mohan, Senior Vice President of the Information Management Group. In the interview, Deepak talks about the pillars of information management, cloud computing, and the drivers of the evolution of information management.

PATRICK: So what are the four pillars of information management?

DEEPAK: We believe that organizations will turn their data stores into strategic assets if they adhere to four...

Michael Parker | 27 Sep 2011 | 0 comments

Have you ever ridden the tube in England? I am always taken with the simple yet effective warning “Mind The Gap” that you see when you step off the tube, which is their subway system, to avoid any potential missteps or injuries.

With that in mind, I’m offering a slight twist on that brilliant phrase when it comes to virtualization – Mind the App. No, I am not talking about the apps you download to your magical devices. I am talking about protecting the status and availability of applications in your virtualized environments.

Why? As I briefly discussed in my last entry, the drivers of virtualization have changed, and application visibility is a critical component for virtualizing business critical applications.


Michael Parker | 13 Sep 2011 | 1 comment

New Drivers of VirtualizationThe drivers of virtualization have changed.
That is what VMware’s Chief Development Officer and co-President, Richard McAniff, said in February, 2011. And in the months since, we’re finding out how true that statement was. According to McAniff, the new drivers are resiliency, high availability, backup, disaster recovery, and of course, security.

Why are they important?
These new drivers are important because businesses are moving from virtualizing test, print, web, and other non-critical servers and applications to business line applications and servers – for example – your CRM, HR system, accounts payable system, and transaction-based...

Michael Parker | 31 Aug 2011 | 1 comment

We should be more concerned about a cyber attack.

That was the message from Cofer Black, former head of the CIA’s Counterterrorism Center, at this year’s Black Hat Security Conference. In fact, his opening words were quite ominous. He said the last time he stood in a room presenting to a large audience with his face being projected on four big screens was in August of 2001. At that time, he warned the audience that there would be a major terrorist attack on U.S. soil where thousands may die. A little over a month later, the attacks on 9/11 took place. His latest prediction at the Black Hat Conference, is that there would be a major cyber attack on the United States which will have...