Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
Steve Trilling | 15 Nov 2013 | 1 comment

 

Defending against sophisticated targeted attacks is now the norm, and it’s not just large companies that are being impacted. These state-sponsored attackers are going after smaller companies now too.  Why is that?  Well, small companies often have business relationships with larger companies that may be the ultimate target of attackers. And, because small companies may have fewer security safeguards than their larger partners, they make a good target for attackers.  So how can businesses – large and small – protect themselves against these sophisticated, targeted attacks?

The answer is through a combination of cutting-edge security technology and a vast intelligence network that monitors our Symantec customers’ networks, and the attackers, around the clock. Our aim is to block attacks no matter what their target is or how they try to get in – at your gateway, on the endpoint and in...

Symantec Corp. | 04 Nov 2013 | 0 comments

   It was a pleasure for Symantec to join John Chambers on stage in New York today for Cisco’s Application Centric Infrastructure (ACI)  and Nexus 9000 series launch. ACI represents a big step forward for our industry, enabling IT to automate provisioning of applications down to the network layer, and monitor the health of those applications from the infrastructure up – all through a single pane of glass.
    Symantec is partnering with Cisco to deliver a more secure, compliant and highly available infrastructure for applications and data. We’ll provide the security customers need in such a dynamic environment, including protection against advanced threats — securing their applications and data wherever they are stored and accessed.
...

Rose Quijano-Nguyen | 15 Sep 2013 | 0 comments

By Dr. Rose Quijano-Nguyen, Principal Certification Strategist – Global Vertical Offerings, Symantec Corp.

As remote working arrangements and “bring your own device” programs become more and more common, both the public and private sectors have an increasing need to protect confidential data on mobile devices against mounting cybersecurity threats. Symantec App Center is a mobile application and content management solution that secures corporate data on iOS and Android mobile devices. To allow the public sector to take advantage of the latest mobile technologies in a secure manner, the Symantec App Center Cryptographic Module recently achieved a certification known as the Federal Information Processing...

Cecily Joseph | 13 Sep 2013 | 0 comments

I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge successes, and reflect on how we can continue to refine our corporate responsibility strategy. We hope that you will take a look and let us know what you think (in exchange for your opinions, we're giving you a chance to vote on how we should direct a $50,000 USD grant - so be sure to visit our stakholder feedback survey!)

We're also hosting our first-ever...

khaley | 03 Sep 2013 | 0 comments

If it’s worth doing, it’s worth doing on the Internet. And it’s not just Silicon Valley startups that feel this way – cybercriminals do, too. In fact, most types of cons and crimes have migrated to the Internet. Nigerian prince scams remain alive and well, finding more willing victims. Robbing banks is now done with a mouse. And in 2012, we saw that kidnapping (called “ransomware,” and in this case holding your computer hostage) finally became viable on the Internet.

At this point, which crimes haven’t gone digital? Well, fortunately technology barriers still remain when it comes to crimes of violence (though some might argue that a DDoS attack comes close), but you might be surprised to learn that blackmail is gaining traction on the Internet.

In February, the Singapore Police sent out a notification warning of a rather tawdry blackmail scam. In essence, female scam artists secretly recorded online sessions with male victims...

Stephen Gillett | 24 Jul 2013 | 0 comments

Gears.jpgSymantec already has some of the strongest talent in the industry and that roster is growing – including several new senior executive roles that I’m very excited to announce today. These new team members will bring a fresh perspective and help drive innovative thinking as we solve critical customer problems.

One of the most important objectives for any leader is to build a strong and empowered team; if you do this right, I believe you can accomplish greatness. Joining us from other innovative technology brands like Google, Amazon and Microsoft, these new leaders share this team-building philosophy and possess deep expertise in areas spanning security, cloud, end-user sensibility and customer experience.

Symantec welcomes:

  • Manny Kostas, Chief Marketing Officer (CMO) will be leveraging a broad base of...
ketan_shah | 14 Jul 2013 | 1 comment

data insight.jpgDark Data.

The term may sound ominous and mysterious, like something out of deep space. Analyst firm Gartner defines dark data as "the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes. Similar to dark matter in physics, dark data often comprises most organizations' universe of information assets."

Today we are announcing Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data, which is generally poorly managed and stored. Many data centers literally have petabytes of unstructured...

Brian Burch | 17 Jun 2013 | 0 comments

When it comes to IT, SMBs have widely varying opinions. Some view it as a necessary evil, much like paying utility bills. Others, however, feel that business computing can set them apart, giving them a strategic advantage over the competition. Symantec recently conducted a global survey of SMBs with a view of assessing their attitudes toward information technology and its place in their business.

Through a portion of the survey responses we established an IT Confidence Index, rating each business on its overall comfort level in using IT to achieve business goals. This numerical value allowed us to clearly identify three tiers of businesses, contrasting the top-tier with the bottom-tier companies to see what significant differences stood out between the two groups.

IT Confidence

As it turns out, IT confidence trickles down from company leadership, beginning with the founder’s previous experience. About three-quarters (74 percent) of top-...

John Eldh | 10 Jun 2013 | 0 comments

More information is always helpful in making decisions.  Many of us check the weather report before heading outdoors on a hike, to make sure we’re prepared for sun or rain. The same principle holds true in business – the more we learn about our industry and current trends, the better prepared we are to weather oncoming storms. With the increasing focus in recent years on protecting confidential information and ensuring sensitive data is secure, the 2013 Cost of a Data Breach Report sheds light on just how costly it can be when our business information is lost or stolen.

A variety of issues are contributing factors in data breaches for business today.  And startlingly, while we are used to thinking of outside attacks as the main focus of a successful defense-in-depth strategy, the report shows that employee negligence and system glitches are actually the cause of nearly two-thirds of data breaches. The...

RobertHamilton | 05 Jun 2013 | 2 comments

SYM-Cost-of-a-Data-Breach-rev-G-2013-05-31_0.jpgLately not a day goes by without a major news story on cybercriminals, hacktivists, and spies.  These are generally viewed as the main threat actors behind the data breaches that we spend so much time -- and budget -- fighting. But what about Anne in Accounting, Sam in Sales and Paul in Production? While malicious attacks are certainly a significant problem and make for thrilling headlines, it’s mistakes made by people and systems that actually cause the majority of data breaches.

According to the 2013 Cost of a Data Breach study, negligence and system glitches together accounted for 64...