Video Screencast Help
Information Unleashed
Showing posts in English
Stephen Gillett | 24 Jul 2013 | 0 comments

Gears.jpgSymantec already has some of the strongest talent in the industry and that roster is growing – including several new senior executive roles that I’m very excited to announce today. These new team members will bring a fresh perspective and help drive innovative thinking as we solve critical customer problems.

One of the most important objectives for any leader is to build a strong and empowered team; if you do this right, I believe you can accomplish greatness. Joining us from other innovative technology brands like Google, Amazon and Microsoft, these new leaders share this team-building philosophy and possess deep expertise in areas spanning security, cloud, end-user sensibility and customer experience.

Symantec welcomes:

  • Manny Kostas, Chief Marketing Officer (CMO) will be leveraging a broad base of...
ketan_shah | 14 Jul 2013 | 1 comment

data insight.jpgDark Data.

The term may sound ominous and mysterious, like something out of deep space. Analyst firm Gartner defines dark data as "the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes. Similar to dark matter in physics, dark data often comprises most organizations' universe of information assets."

Today we are announcing Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data, which is generally poorly managed and stored. Many data centers literally have petabytes of unstructured...

Brian Burch | 17 Jun 2013 | 0 comments

When it comes to IT, SMBs have widely varying opinions. Some view it as a necessary evil, much like paying utility bills. Others, however, feel that business computing can set them apart, giving them a strategic advantage over the competition. Symantec recently conducted a global survey of SMBs with a view of assessing their attitudes toward information technology and its place in their business.

Through a portion of the survey responses we established an IT Confidence Index, rating each business on its overall comfort level in using IT to achieve business goals. This numerical value allowed us to clearly identify three tiers of businesses, contrasting the top-tier with the bottom-tier companies to see what significant differences stood out between the two groups.

IT Confidence

As it turns out, IT confidence trickles down from company leadership, beginning with the founder’s previous experience. About three-quarters (74 percent) of top-...

John Eldh | 10 Jun 2013 | 0 comments

More information is always helpful in making decisions.  Many of us check the weather report before heading outdoors on a hike, to make sure we’re prepared for sun or rain. The same principle holds true in business – the more we learn about our industry and current trends, the better prepared we are to weather oncoming storms. With the increasing focus in recent years on protecting confidential information and ensuring sensitive data is secure, the 2013 Cost of a Data Breach Report sheds light on just how costly it can be when our business information is lost or stolen.

A variety of issues are contributing factors in data breaches for business today.  And startlingly, while we are used to thinking of outside attacks as the main focus of a successful defense-in-depth strategy, the report shows that employee negligence and system glitches are actually the cause of nearly two-thirds of data breaches. The...

RobertHamilton | 05 Jun 2013 | 2 comments

SYM-Cost-of-a-Data-Breach-rev-G-2013-05-31_0.jpgLately not a day goes by without a major news story on cybercriminals, hacktivists, and spies.  These are generally viewed as the main threat actors behind the data breaches that we spend so much time -- and budget -- fighting. But what about Anne in Accounting, Sam in Sales and Paul in Production? While malicious attacks are certainly a significant problem and make for thrilling headlines, it’s mistakes made by people and systems that actually cause the majority of data breaches.

According to the 2013 Cost of a Data Breach study, negligence and system glitches together accounted for 64...

Danny Milrad | 09 May 2013 | 0 comments

EV2N0375.JPGLast fall businesses across the Eastern Coast of the United States were heavily impacted by the devastating effect of Hurricane Sandy. For several of our customers the storm underscored the importance of establishing a defined business continuity process. While the safety of people is always the first priority, the impact of similar events on government services, corporations and small businesses was tremendous and needs to be addressed long term.

Yesterday I had the opportunity to participate in Symantec’s CIO Forum in New York City that preceded the NASDAQ Closing Bell Ceremony. At the event, Symantec customers and partners discussed the importance of ensuring business continuity, specifically in the wake of Hurricane Sandy. These professionals were responsible for business critical data located directly in the storm’s path and needed...

Symantec Corp. | 24 Apr 2013 | 0 comments

We spend a lot of time talking about our company goals, offerings, marketing and sales, and the Symantec 4.0 transition. As a global company with employees in more than 50 countries, we have the unique ability to address some of society's biggest challenges as part of our business goals... we also have a bigger responsibility to make our world better.

Over the past several months, I’ve talked about corporate responsibility a lot internally – we’re  striving for corporate responsibility leadership. But right now, I'd like to focus on one aspect of corporate responsibility and talk about what our employees are doing to contribute to our local communities. Last fiscal year, we set a goal to raise our employee volunteering hours by 20 percent.

Research has shown...

Symantec Corp. | 18 Apr 2013 | 0 comments

8656787198_85ae004714_c.jpgSymantec Vision gave us a lot to think about, and we were fortunate to hear from Symantec leadership, who shared important insights about the current state of information security and the direction of the company moving forward. First, Symantec’s CEO Steve Bennett shared his experience over the past several months as the company has worked to redefine its focus on solving our customers’ problems and achieving organic growth. He reiterated that we are committed to intelligent, manageable changes that will revitalize Symantec, the partner community and the world of information protection.

We also heard from Francis deSouza, president of product and services at Symantec who delved into today’s...

khaley | 15 Apr 2013 | 0 comments

Targeted_Attacks_in2012_1280x394.jpgSome of us are numbers people.  We like nothing more than digging into a big batch of numbers.  I confess I’m the other type of person. I still fumble around a spreadsheet and can’t add without the aid of a calculator. For numbers people the ISTR is a terrific document. This year’s report is 160 pages of numbers that do a pretty good job of describing the threat landscape. If you’re a numbers person, feel free to dig in to the full report. You can also check out highlights in this graphic.

If you’re like me, and not really a numbers person, then read on. I’ve bullied my way through the numbers so you don’t have to. Let me give you the highlights, some of the interesting...

Symantec Corp. | 26 Mar 2013 | 0 comments

 

By Joe Bertnick, Director of Product Management, Symantec Corp.

On the battlefield, a general’s responsibility is to coordinate different bodies of soldiers whose commanders may not know what the others are doing. The complete picture of the battle only emerges when these individual reports can be combined and analyzed, yielding a strategy to ensure victory. Just as modern war has come to involve smaller bodies of soldiers carrying out specific missions, our security tools in the data center are addressing new and unique risks to different parts of the security ecosystem. In this world, the CISO is the general directing our overall efforts, merging the “in the trenches” technical details with the overall strategic direction of the business. And they need to be able to gather this intelligence anywhere, at any time, because security incidents aren’t limited to office hours. And...