Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Information Unleashed
Showing posts in English
TrevorD | 09 Jan 2013 | 1 comment

There is little doubt about the value of information to businesses of all sizes. In fact, some of our recent research found that worldwide spending on business information is $1.1 Trillion – enough money to buy an iPad for every worker in the world. Information is the life blood of any organization, and often its biggest asset. While electronically stored information (ESI) is most often an asset, it can also be a liability depending on how much it costs to store, if it is retained indefinitely, and especially if information that is no longer needed is inadvertently distributed outside of the organization.

It is necessary for companies to have an information retention plan to manage this...

Symantec Corp. | 08 Jan 2013 | 3 comments

By Robert Hamilton, Director Product Marketing, Symantec

One of the most damaging events a business can experience is the loss or theft of sensitive information, be it proprietary information about the organization itself of personal details of its customers – either way a data breach can cause millions of dollars in damages. Reducing the risk of data breach is a board-level priority for organizations. Much of the focus has always been on preventing external attacks. But, it’s not just bad people doing bad things that organizations need to worry about. On a daily basis, employees take inadvertent risks while trying to get their jobs done. With the massive growth in tablets and smartphone adoptions, security organizations have struggled with how to better support their businesses in adopting these new technologies, while also maintaining strong protections for their sensitive information.

More than ever, CISOs and security organizations want to be...

khaley | 21 Dec 2012 | 2 comments

Are malware authors becoming more unpleasant? The amount of cyber-crime goes up year after year and 2013 will be no exception. Bad guys will continue to dream up new ways to rip people off.  Sure, we’ll be stolen from, spied on and threatened in 2013. None of this will be new. But there is a new trend that started in 2012 and seeming set to take off in 2013. I call it nastiness.

We didn’t call out this trend in our 2013 predictions. But if you look at those predictions you can see it. I can’t tell you why this is or why it started. This nastiness is happening in targeted attacks and in massive attacks. They are quite separate trends—done for quite different reasons and...

John Eldh | 18 Dec 2012 | 0 comments

With 2013 just around the corner, we felt it important to garner insight from our team on the evolving technology landscape in security, storage, cloud and virtualization – and then determine how this evolution will impact the channel community.  Through discussions with our team of experts, we have identified five key industry trends that prove to be beneficial to partners and provide them with an infinite number of business opportunities in the coming year:

1. Cyber conflict becomes the new normal

In 2013 and beyond, conflicts between nations, organizations, and individuals will play a key role in the cyber world. Espionage can be successful and also easily deniable when conducted online. Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets as well as impact grids, systems and infrastructure in general.

Additionally, we expect...

MatthewEllard | 12 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part two, Part three.

To conclude our series of blogs on the value of information and IP, we’re going to look at the ways in which information and IP – which has become so valuable to businesses – can be protected.

As the flow of information has shifted beyond the data centre, information management is more important than ever. To minimise information sprawl and its effects on the organisation, businesses can follow a few simple steps:

  • Focus on the information, not the device...
Symantec Corp. | 12 Dec 2012 | 0 comments

By Brian Burch, Vice President of Americas Marketing for SMB at Symantec

Most people agree that small- to medium-sized businesses (SMBs) are a significant source of the innovation that fuels growth, but a lesser recognized fact is the critical role of start-ups in economic recovery. A new report from the Kauffman Foundation indicates that the pace of recovery in hiring and job creation since 2008 is stronger in newer firms – 4 out of every 10 hires at young firms are for newly created jobs.

Supporting small businesses, established and new, in their development and growth is germane to the economy. A major part of small businesses’ success now and in the future will increasingly derive from their business relationships with large corporations. More...

MatthewEllard | 09 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part twoPart four.

In our series of blogs about the value of ideas and IP, we have covered the vital need to protect information and also the instances when protection is not appropriate – either because it hampers business processes or because the data has become old and therefore worthless.

What has become clear is that not all information is equal in value. Some is of very high value while other data can actually represent a cost to a business – either because it has to be stored and protected...

MatthewEllard | 04 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part three, Part four.

In my last post discussing the value of an idea, it was argued that more attention needs to paid to understanding the value of intangible assets – information saved as digital records. A retailer wouldn’t leave its stock in an unlocked warehouse so why would – for example – an industrial designer leave plans and client details open to competitors via an unsecured USB drive or unencrypted email message?

While there are some simple...

Symantec Corp. | 04 Dec 2012 | 0 comments

By Dan Lamorena, Director, Product Marketing, Storage and Availability Management Group

A couple of weeks ago, my colleague Kevin Haley posted the Top Five Security Predictions for 2013. Today we share with you the top storage predictions for 2013.

As we share them, we realize that we don’t have solutions that address all of the facets of these predictions, but it is what we see as major issues addressing the market in the coming year based on our experience and conversations with our customers and partners.

1. Hypervisor market share will dramatically change with greater diversity of virtualization solutions.

The market share of hypervisor vendors will begin to see major changes between the largest...

MatthewEllard | 02 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part two, Part three, Part four.

We live in a knowledge-based economy – where ideas are money. In fact, according to the Intellectual Property Office, the UK design industry alone is worth over £15bn a year to the nation’s coffers.

As a result, it has never been more vital for industry and individuals to protect the fruits of their intellectual labour. This includes customer information, financial or legal records, designs, written articles and records, or any number of other different types of explicit, recorded...