Video Screencast Help
Information Unleashed
Showing posts in English
Symantec Corp. | 21 Mar 2013 | 0 comments

By Cheryl Tang, Senior Product Marketing Manager, Symantec Corp.

In today’s global economy, it’s no secret that many organizations rely on third parties for critical business activities. While outsourcing isn’t a new concept, the rise of readily available cloud-based and everything-as-a-service solutions is rapidly increasing an organization’s liability and risk landscape – often with limited IT oversight.

Unfortunately many enterprises relying on third-party vendors often assume that these third parties properly protect their sensitive employee, customer and business data. Sadly, this is not always the case. Consider these data points:

  • Only 24 percent of respondents require third-party suppliers or partners to comply with baseline security procedures.[1]
  • Although 84 percent of senior IT decision makers [were] concerned or very concerned about the risks associated...
Tim_Matthews | 13 Mar 2013 | 0 comments

The show floor at RSA was buzzing with discussion of attacks against critical infrastructure and state-sponsored attacks – the words hactivist and A.P.T. were uttered frequently.  But, while cyber-espionage was making headlines from the show, Symantec took the opportunity to survey information security pros on insider issues related to data access and mobility. The findings show that although 76 percent of businesses saw cyberattacks in the past year, increased use of mobile devices is making the insider threat more relevant than ever before.

It should come as no surprise that the top three motivators for the move to mobility are: business drivers, user demand and financial...

Cecily Joseph | 25 Feb 2013 | 0 comments

Education – particularly science, technology, engineering, and math education, as well as equal access to education around the globe – is a strong focus for Symantec. This is why we’ve announced more than $1 million in grant funding to education-focused initiatives today.

With these funds, we’ve started some new relationships with institutions focused on education, reflecting our growth in this space and our maturation as a global company, and strengthened our relationships with some long-standing partners with whom we’ve worked for many years. These latest grants give us an opportunity to more fully apply our resources in terms of employee time and talent, and to expand our reach into new geographic areas.

The...

FranRosch | 18 Feb 2013 | 0 comments

Successful technology adoption requires managing the drawbacks while maximizing the benefits, and few trends today illustrate this better than mobility. We’re seeing a wide variety in the degree to which organizations are allowing employees to use mobile devices for business, as well as the amount of control they are exerting over devices and applications. To see the results of these different philosophies and determine how organizations can get the most out of their mobile deployment, Symantec surveyed more than 3,000 organizations, from SMBs to large enterprises.

Innovators and Traditionals

We asked the businesses about their level of involvement with mobility, and noted two distinct groups among the...

RobertHamilton | 06 Feb 2013 | 0 comments

fren·e·my [fren-uh-mee] noun. Someone who is both friend and enemy, a relationship that is both mutually beneficial or dependent while being competitive, fraught with risk.

When it comes to taking your intellectual property (IP), employees are the less obvious player but they can be frenemy #1. In many cases, these trusted employees are moving, sharing and exposing sensitive data in order to do their daily jobs. In other instances, they are deliberately taking confidential information to use at their next employer. It’s not that these employees are inherently malicious – often they just don’t know it is wrong to do so.

According to a new Symantec survey...

Symantec Corp. | 31 Jan 2013 | 8 comments

 

As a follow-up to a story run by the New York Times on Wednesday, Jan. 30, 2013 announcing they had been the target of a cyber attack, Symantec (NASDAQ: SYMC) developed the following statement:
 
"Advanced attacks like the ones the New York Times described in the following article, (http://nyti.ms/TZtr5z), underscore how important it is for companies, countries and consumers to make sure they are using the full capability of security solutions. The advanced capabilities in our endpoint offerings, including our unique reputation-based technology and behavior-based blocking, specifically target sophisticated attacks. Turning on only the signature-based anti-virus components of endpoint solutions alone are not enough in a world that is changing daily from attacks and threats. We encourage customers to be very aggressive in deploying solutions that offer a...
Symantec Corp. | 23 Jan 2013 | 14 comments

By Steve Bennett, President and CEO, Symantec

Symantec’s strategy is clear: We want to enable people, businesses and countries to focus their energies and time on achieving their aspirations, instead of being consumed with how to keep their digital lives safe and protected.  This is a story about more focus and better execution by Symantec to make things better and easier for our customers and partners. Our path is straightforward: Offer better products and services tailor made for customers, and make it easier for them to research, shop, buy, use, and get the help and support they need.

There is a huge set of underserved and unmet needs that customers are experiencing with regards to protecting, moving and managing their information on multiple devices. ...

Digital Dave | 15 Jan 2013 | 0 comments

Businesses are adopting new technology at an unprecedented pace, and the cloud is one area where we’re making the most progress. And by now it’s clear that the cloud provides significant advantages to businesses, improving agility and reducing costs. But there is a darker side as well that organizations may overlook – hidden costs of cloud implementation that can negate the benefits if not properly contained.

The 2013 Symantec Avoiding the Hidden Costs of Cloud Survey reveals some of these unanticipated challenges businesses face as they look to take advantage of today’s efficient cloud solutions. The businesses surveyed showed that, compared to a year ago, cloud adoption is seeing significant progress. In fact, 90 percent of them are now at least discussing the cloud, an increase from 75 percent a year before. But at the same, cloud computing presents its own set of challenges, and industry experts anticipate that security issues and outages will...

TrevorD | 09 Jan 2013 | 1 comment

There is little doubt about the value of information to businesses of all sizes. In fact, some of our recent research found that worldwide spending on business information is $1.1 Trillion – enough money to buy an iPad for every worker in the world. Information is the life blood of any organization, and often its biggest asset. While electronically stored information (ESI) is most often an asset, it can also be a liability depending on how much it costs to store, if it is retained indefinitely, and especially if information that is no longer needed is inadvertently distributed outside of the organization.

It is necessary for companies to have an information retention plan to manage this...

Symantec Corp. | 08 Jan 2013 | 3 comments

By Robert Hamilton, Director Product Marketing, Symantec

One of the most damaging events a business can experience is the loss or theft of sensitive information, be it proprietary information about the organization itself of personal details of its customers – either way a data breach can cause millions of dollars in damages. Reducing the risk of data breach is a board-level priority for organizations. Much of the focus has always been on preventing external attacks. But, it’s not just bad people doing bad things that organizations need to worry about. On a daily basis, employees take inadvertent risks while trying to get their jobs done. With the massive growth in tablets and smartphone adoptions, security organizations have struggled with how to better support their businesses in adopting these new technologies, while also maintaining strong protections for their sensitive information.

More than ever, CISOs and security organizations want to be...