Video Screencast Help
Information Unleashed
Showing posts in English
Brian Burch | 17 Jun 2013 | 0 comments

When it comes to IT, SMBs have widely varying opinions. Some view it as a necessary evil, much like paying utility bills. Others, however, feel that business computing can set them apart, giving them a strategic advantage over the competition. Symantec recently conducted a global survey of SMBs with a view of assessing their attitudes toward information technology and its place in their business.

Through a portion of the survey responses we established an IT Confidence Index, rating each business on its overall comfort level in using IT to achieve business goals. This numerical value allowed us to clearly identify three tiers of businesses, contrasting the top-tier with the bottom-tier companies to see what significant differences stood out between the two groups.

IT Confidence

As it turns out, IT confidence trickles down from company leadership, beginning with the founder’s previous experience. About three-quarters (74 percent) of top-...

John Eldh | 10 Jun 2013 | 0 comments

More information is always helpful in making decisions.  Many of us check the weather report before heading outdoors on a hike, to make sure we’re prepared for sun or rain. The same principle holds true in business – the more we learn about our industry and current trends, the better prepared we are to weather oncoming storms. With the increasing focus in recent years on protecting confidential information and ensuring sensitive data is secure, the 2013 Cost of a Data Breach Report sheds light on just how costly it can be when our business information is lost or stolen.

A variety of issues are contributing factors in data breaches for business today.  And startlingly, while we are used to thinking of outside attacks as the main focus of a successful defense-in-depth strategy, the report shows that employee negligence and system glitches are actually the cause of nearly two-thirds of data breaches. The...

RobertHamilton | 04 Jun 2013 | 2 comments

SYM-Cost-of-a-Data-Breach-rev-G-2013-05-31_0.jpgLately not a day goes by without a major news story on cybercriminals, hacktivists, and spies.  These are generally viewed as the main threat actors behind the data breaches that we spend so much time -- and budget -- fighting. But what about Anne in Accounting, Sam in Sales and Paul in Production? While malicious attacks are certainly a significant problem and make for thrilling headlines, it’s mistakes made by people and systems that actually cause the majority of data breaches.

According to the 2013 Cost of a Data Breach study, negligence and system glitches together accounted for 64...

Danny Milrad | 09 May 2013 | 0 comments

EV2N0375.JPGLast fall businesses across the Eastern Coast of the United States were heavily impacted by the devastating effect of Hurricane Sandy. For several of our customers the storm underscored the importance of establishing a defined business continuity process. While the safety of people is always the first priority, the impact of similar events on government services, corporations and small businesses was tremendous and needs to be addressed long term.

Yesterday I had the opportunity to participate in Symantec’s CIO Forum in New York City that preceded the NASDAQ Closing Bell Ceremony. At the event, Symantec customers and partners discussed the importance of ensuring business continuity, specifically in the wake of Hurricane Sandy. These professionals were responsible for business critical data located directly in the storm’s path and needed...

Symantec Corp. | 24 Apr 2013 | 0 comments

We spend a lot of time talking about our company goals, offerings, marketing and sales, and the Symantec 4.0 transition. As a global company with employees in more than 50 countries, we have the unique ability to address some of society's biggest challenges as part of our business goals... we also have a bigger responsibility to make our world better.

Over the past several months, I’ve talked about corporate responsibility a lot internally – we’re  striving for corporate responsibility leadership. But right now, I'd like to focus on one aspect of corporate responsibility and talk about what our employees are doing to contribute to our local communities. Last fiscal year, we set a goal to raise our employee volunteering hours by 20 percent.

Research has shown...

Symantec Corp. | 18 Apr 2013 | 0 comments

8656787198_85ae004714_c.jpgSymantec Vision gave us a lot to think about, and we were fortunate to hear from Symantec leadership, who shared important insights about the current state of information security and the direction of the company moving forward. First, Symantec’s CEO Steve Bennett shared his experience over the past several months as the company has worked to redefine its focus on solving our customers’ problems and achieving organic growth. He reiterated that we are committed to intelligent, manageable changes that will revitalize Symantec, the partner community and the world of information protection.

We also heard from Francis deSouza, president of product and services at Symantec who delved into today’s...

khaley | 15 Apr 2013 | 0 comments

Targeted_Attacks_in2012_1280x394.jpgSome of us are numbers people.  We like nothing more than digging into a big batch of numbers.  I confess I’m the other type of person. I still fumble around a spreadsheet and can’t add without the aid of a calculator. For numbers people the ISTR is a terrific document. This year’s report is 160 pages of numbers that do a pretty good job of describing the threat landscape. If you’re a numbers person, feel free to dig in to the full report. You can also check out highlights in this graphic.

If you’re like me, and not really a numbers person, then read on. I’ve bullied my way through the numbers so you don’t have to. Let me give you the highlights, some of the interesting...

Symantec Corp. | 26 Mar 2013 | 0 comments

By Joe Bertnick, Director of Product Management, Symantec Corp.

On the battlefield, a general’s responsibility is to coordinate different bodies of soldiers whose commanders may not know what the others are doing. The complete picture of the battle only emerges when these individual reports can be combined and analyzed, yielding a strategy to ensure victory. Just as modern war has come to involve smaller bodies of soldiers carrying out specific missions, our security tools in the data center are addressing new and unique risks to different parts of the security ecosystem. In this world, the CISO is the general directing our overall efforts, merging the “in the trenches” technical details with the overall strategic direction of the business. And they need to be able to gather this intelligence anywhere, at any time, because security incidents aren’t limited to office hours. And while...

Symantec Corp. | 21 Mar 2013 | 0 comments

By Cheryl Tang, Senior Product Marketing Manager, Symantec Corp.

In today’s global economy, it’s no secret that many organizations rely on third parties for critical business activities. While outsourcing isn’t a new concept, the rise of readily available cloud-based and everything-as-a-service solutions is rapidly increasing an organization’s liability and risk landscape – often with limited IT oversight.

Unfortunately many enterprises relying on third-party vendors often assume that these third parties properly protect their sensitive employee, customer and business data. Sadly, this is not always the case. Consider these data points:

  • Only 24 percent of respondents require third-party suppliers or partners to comply with baseline security procedures.[1]
  • Although 84 percent of senior IT decision makers [were] concerned or very concerned about the risks associated...
Tim_Matthews | 13 Mar 2013 | 0 comments

The show floor at RSA was buzzing with discussion of attacks against critical infrastructure and state-sponsored attacks – the words hactivist and A.P.T. were uttered frequently.  But, while cyber-espionage was making headlines from the show, Symantec took the opportunity to survey information security pros on insider issues related to data access and mobility. The findings show that although 76 percent of businesses saw cyberattacks in the past year, increased use of mobile devices is making the insider threat more relevant than ever before.

It should come as no surprise that the top three motivators for the move to mobility are: business drivers, user demand and financial...