Video Screencast Help
Information Unleashed
Showing posts in English
khaley | 21 Dec 2012 | 2 comments

Are malware authors becoming more unpleasant? The amount of cyber-crime goes up year after year and 2013 will be no exception. Bad guys will continue to dream up new ways to rip people off.  Sure, we’ll be stolen from, spied on and threatened in 2013. None of this will be new. But there is a new trend that started in 2012 and seeming set to take off in 2013. I call it nastiness.

We didn’t call out this trend in our 2013 predictions. But if you look at those predictions you can see it. I can’t tell you why this is or why it started. This nastiness is happening in targeted attacks and in massive attacks. They are quite separate trends—done for quite different reasons and...

John Eldh | 18 Dec 2012 | 0 comments

With 2013 just around the corner, we felt it important to garner insight from our team on the evolving technology landscape in security, storage, cloud and virtualization – and then determine how this evolution will impact the channel community.  Through discussions with our team of experts, we have identified five key industry trends that prove to be beneficial to partners and provide them with an infinite number of business opportunities in the coming year:

1. Cyber conflict becomes the new normal

In 2013 and beyond, conflicts between nations, organizations, and individuals will play a key role in the cyber world. Espionage can be successful and also easily deniable when conducted online. Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets as well as impact grids, systems and infrastructure in general.

Additionally, we expect...

MatthewEllard | 12 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part two, Part three.

To conclude our series of blogs on the value of information and IP, we’re going to look at the ways in which information and IP – which has become so valuable to businesses – can be protected.

As the flow of information has shifted beyond the data centre, information management is more important than ever. To minimise information sprawl and its effects on the organisation, businesses can follow a few simple steps:

  • Focus on the information, not the device...
Symantec Corp. | 12 Dec 2012 | 0 comments

By Brian Burch, Vice President of Americas Marketing for SMB at Symantec

Most people agree that small- to medium-sized businesses (SMBs) are a significant source of the innovation that fuels growth, but a lesser recognized fact is the critical role of start-ups in economic recovery. A new report from the Kauffman Foundation indicates that the pace of recovery in hiring and job creation since 2008 is stronger in newer firms – 4 out of every 10 hires at young firms are for newly created jobs.

Supporting small businesses, established and new, in their development and growth is germane to the economy. A major part of small businesses’ success now and in the future will increasingly derive from their business relationships with large corporations. More...

MatthewEllard | 09 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part twoPart four.

In our series of blogs about the value of ideas and IP, we have covered the vital need to protect information and also the instances when protection is not appropriate – either because it hampers business processes or because the data has become old and therefore worthless.

What has become clear is that not all information is equal in value. Some is of very high value while other data can actually represent a cost to a business – either because it has to be stored and protected...

MatthewEllard | 04 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part three, Part four.

In my last post discussing the value of an idea, it was argued that more attention needs to paid to understanding the value of intangible assets – information saved as digital records. A retailer wouldn’t leave its stock in an unlocked warehouse so why would – for example – an industrial designer leave plans and client details open to competitors via an unsecured USB drive or unencrypted email message?

While there are some simple...

Symantec Corp. | 04 Dec 2012 | 0 comments

By Dan Lamorena, Director, Product Marketing, Storage and Availability Management Group

A couple of weeks ago, my colleague Kevin Haley posted the Top Five Security Predictions for 2013. Today we share with you the top storage predictions for 2013.

As we share them, we realize that we don’t have solutions that address all of the facets of these predictions, but it is what we see as major issues addressing the market in the coming year based on our experience and conversations with our customers and partners.

1. Hypervisor market share will dramatically change with greater diversity of virtualization solutions.

The market share of hypervisor vendors will begin to see major changes between the largest...

MatthewEllard | 02 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part two, Part three, Part four.

We live in a knowledge-based economy – where ideas are money. In fact, according to the Intellectual Property Office, the UK design industry alone is worth over £15bn a year to the nation’s coffers.

As a result, it has never been more vital for industry and individuals to protect the fruits of their intellectual labour. This includes customer information, financial or legal records, designs, written articles and records, or any number of other different types of explicit, recorded...

John_Brigden | 27 Nov 2012 | 0 comments

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the...

Symantec Corp. | 20 Nov 2012 | 0 comments

By Sanjay Sawhney, Senior Director of Research at Symantec Research Labs

The technology landscape is rapidly changing into a more mobile and cloud-based world.  And in this world, the end user and servers (services provided to the end user) are ‘virtual’ or decoupled from devices, physical machines and networks.

However, there are a few constants:

  • The user and server have to share a single root of trust with one another (mutual authentication)
  • The data and sharing of the data drives a lot of the end user experience; not the device or the application
  • In this evolving technology landscape, who does what  with any piece of data is the most important aspect of providing security
  • Harnessing the humongous data...