Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Information Unleashed
Showing posts in English
Trevor D. | 15 Oct 2012 | 0 comments

 

A well-run business today is like a good movie: behind the scenes a lot of work is required to ensure that the production stays on track. And for today’s organizations, behind the products and sales is the need to effectively managing all the information that keeps the operation running. The challenge is that the amount of information to manage is increasing by leaps and bounds. And with more information being taken beyond the confines of the network on mobile devices and in the cloud, this is creating significant challenges.

The 2012 Symantec State of Information Survey reveals that with all these additional ways to store and access information, 42 percent of business information is duplicate. Having multiple copies of files is one of the biggest challenges facing...

caroline wong | 12 Oct 2012 | 0 comments

When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since data of all types – including confidential – are being mixed together to generate analytics which can be used for better decision making. But while there are concerns, big data can actually be harnessed to improve security.

The job of the defender is to protect against an infinite number of attacks. However, a defender will always have a limited amount of resources with which to do this. The real job of the security practitioner is to prioritize remediation efforts by risk, so that the limited resources can be focused on addressing the greatest risks to the business.

Most security organizations have anywhere between five and hundreds of different security technologies deployed in their enterprise environments....

Mike Reynolds PMM | 05 Oct 2012 | 0 comments

A few weeks ago, we had a data center go down. In fact we purposely dropped it down 18 stories from a building right in the heart of Silicon Valley.

What happened when this data center went down? First, it made a really, really loud boom, and then it seamlessly failed over to a recovery site. Exactly what a business would need.

Why did we do this?

To demonstrate how organizations can protect their data and applications, and keep their operations running smoothly and their customers happy.

If they do go down, they need to recover – fast.

With increasing adoption of virtualization technologies, customers virtualize applications to reap the benefits these platforms provide. Virtualization enables lower costs in the form of less space requirements, less power needed to run fewer physical servers, lower cooling requirements, etc. But how do they do this while taking the risks of virtualization out...

John_Brigden | 01 Oct 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up...

khaley | 20 Sep 2012 | 0 comments

 

In recent years there has been no shortage of news on highly sophisticated threats that are evading detection for long periods, causing serious damage to organizations and stealing valuable information. These are often directed at defense or other government targets, but we still feel the paranoia that we could be the next victim. While we worry about these highly targeted threats, looking for new solutions to protect us from these attacks, are we ignoring simple and effective steps to get the most out of our existing solutions? Are we neglecting our patches and updates, so worried about high-profile threats that simple, common threats easily enter our network?

Whatever new threats are developed, it will never be advisable to neglect the most basic security policies and practices. While we need to be aware of the evolution of security trends, it’s the little things that can still kill us. This point is further explored in my recent guest post in Forbes,...

Kevin Isaac | 17 Sep 2012 | 0 comments

The recent security attacks targeting oil/gas sector in the Middle East have attracted massive public attention and generated headlines in high profile business publications around the world, reminding companies that targeted attacks are not waning, far from it!. These threats continue to be a growing risk for businesses of all sizes and all sectors – no one is immune.

According to Symantec’s Internet Security Threat Report, targeted attacks use customized malware and refined targeted social engineering to gain unauthorized access to sensitive information and have increased from an average of 77 per day in 2010 to 82 per day in 2011. Symantec has also identified a new...

Danny Milrad | 16 Sep 2012 | 0 comments

Few people would disagree with the statement that our world is becoming more complex, and this is especially apparent in the data center. With new technology being rapidly adopted, from mobile devices to cloud computing, businesses are struggling to integrate new solutions that promise increased productivity and cost-savings, while managing ever-growing amounts of information. In order to assess how well organizations are dealing with these changes, we developed the 2012 State of the Data Center Survey.

This is the fifth year that Symantec has run the survey.  To highlight how far IT organizations have come in such a short period of time we only need to look back to the complexities and initiatives to simplify....

Symantec Security Response | 06 Sep 2012 | 0 comments

In 2009, we saw the start of high profile attacks by a group using the Hydraq (Aurora) Trojan horse. We've been monitoring the attacking group's activities for the last three years as they've consistently targeted a number of industries. These attackers have used a large number of zero-day exploits against not just the intended target organization, but also on the supply chain manufacturers that service the company in their cross hairs. These attackers are systematic and re-use components of an infrastructure we have termed the "Elderwood Platform". The term "Elderwood" comes from the exploit communication used in some of the attacks. This attack platform enables them to quickly deploy zero-day exploits. The attacking methodology has always used spear phishing emails but we are now seeing an increased adoption of "watering hole" attacks (...

Marian Merritt | 05 Sep 2012 | 0 comments

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects- and increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under ½ of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.

The nature of the crimes is shifting towards the social networks we love and the mobile devices we use constantly. Consumers seem to...

Patricia Titus | 30 Aug 2012 | 0 comments

For many people, owning a dog can be a truly rewarding experience. But it takes careful preparation and hard work for that unruly puppy to grow up into an obedient, faithful companion – without training and discipline, you might end up with chewed-up sneakers and frightened neighbors. And while the corporate data center seems a world away from a backyard kennel, many of the same principles apply when you are bringing new technology into the workplace – the amount of preparation you do will largely determine your success. Of particular concern these days is the growing desire of employees to use their own mobile devices for work. This BYOD (bring your own device) trend is causing concern among IT administrators and senior management alike. But with adequate preparation and management...