Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
Cecily Joseph | 29 Oct 2012 | 0 comments

Recently, I had the opportunity to sit down with Symantec CEO Steve Bennett to talk about Symantec’s approach to corporate responsibility. In the course of the conversation, he discussed what he believes responsibility means at Symantec, some of the company’s recent accomplishments, and the challenges to be tackled in the coming year. You can read more about Symantec's approach in our 2012 Corporate Responsibility Report.

Symantec Corp. | 29 Oct 2012 | 0 comments

By Rob Greer, Vice President & General Manager, Enterprise Mobility, Symantec

Over the last few years, we’ve seen an increase in the number of new mobile operating systems. The latest example is Microsoft’s announcement today of the availability of Windows Phone 8. At Symantec, we work to ensure that our customers are able to protect and manage their data, apps, devices and users on all mobile platforms. As such, we’re pleased to announce that Symantec Mobile Management Suite – a single solution that covers mobile device management, mobile application management, and mobile security – now provides support for the new Windows Phone 8 platform.

As users start to access corporate email and other resources with their new Windows Phone 8 devices, businesses will need to protect these activities. The mobile device management component of the suite,...

Symantec Corp. | 22 Oct 2012 | 0 comments

By John Eldh, vice president, channel sales, Americas, Symantec 

Last month, we held our annual Partner Engage conference in Baltimore – my first as the new Symantec Channel Chief – and coming away from that event I am filled with a real sense of excitement about the opportunities, insight and experiences we shared there. As you all know, Symantec is in a state of evolution -- transforming, refining and improving products, services and processes that can make a difference to partners and their customers. Steve Bennett, our new CEO, spoke at the event and outlined a strategy we are calling ‘Symantec 4.0’ that will be marked by tremendous new opportunities for our partners. I’ve been with Symantec for eight years – they’ve all been great years...

khaley | 16 Oct 2012 | 0 comments

By visiting which type of website are you more likely to get infected with malware?  A religious site or an adult site?  I’ve been asking that question to computer security professionals for almost a year now.  If you’ve read the Internet Security Threat report version 17 you know the answer. It’s religious sites.  We discovered that a higher percentage of religious sites have been hacked into and loaded up with malware by the bad guys than adult sites.  

I like to quiz people on this one, because it doesn’t meet expectations.  Some people sense a set up in the question, but most answer that you’re more likely to get infected on a adult website.  The real message I try to leave behind with...

Trevor D. | 15 Oct 2012 | 0 comments

A well-run business today is like a good movie: behind the scenes a lot of work is required to ensure that the production stays on track. And for today’s organizations, behind the products and sales is the need to effectively managing all the information that keeps the operation running. The challenge is that the amount of information to manage is increasing by leaps and bounds. And with more information being taken beyond the confines of the network on mobile devices and in the cloud, this is creating significant challenges.

The 2012 Symantec State of Information Survey reveals that with all these additional ways to store and access information, 42 percent of business information is duplicate. Having multiple copies of files is one of the biggest challenges facing organizations...

caroline wong | 12 Oct 2012 | 0 comments

When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since data of all types – including confidential – are being mixed together to generate analytics which can be used for better decision making. But while there are concerns, big data can actually be harnessed to improve security.

The job of the defender is to protect against an infinite number of attacks. However, a defender will always have a limited amount of resources with which to do this. The real job of the security practitioner is to prioritize remediation efforts by risk, so that the limited resources can be focused on addressing the greatest risks to the business.

Most security organizations have anywhere between five and hundreds of different security technologies deployed in their enterprise environments....

Mike Reynolds PMM | 05 Oct 2012 | 0 comments

A few weeks ago, we had a data center go down. In fact we purposely dropped it down 18 stories from a building right in the heart of Silicon Valley.

What happened when this data center went down? First, it made a really, really loud boom, and then it seamlessly failed over to a recovery site. Exactly what a business would need.

Why did we do this?

To demonstrate how organizations can protect their data and applications, and keep their operations running smoothly and their customers happy.

If they do go down, they need to recover – fast.

With increasing adoption of virtualization technologies, customers virtualize applications to reap the benefits these platforms provide. Virtualization enables lower costs in the form of less space requirements, less power needed to run fewer physical servers, lower cooling requirements, etc. But how do they do this while taking the risks of virtualization out...

John_Brigden | 01 Oct 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up...

khaley | 20 Sep 2012 | 0 comments

In recent years there has been no shortage of news on highly sophisticated threats that are evading detection for long periods, causing serious damage to organizations and stealing valuable information. These are often directed at defense or other government targets, but we still feel the paranoia that we could be the next victim. While we worry about these highly targeted threats, looking for new solutions to protect us from these attacks, are we ignoring simple and effective steps to get the most out of our existing solutions? Are we neglecting our patches and updates, so worried about high-profile threats that simple, common threats easily enter our network?

Whatever new threats are developed, it will never be advisable to neglect the most basic security policies and practices. While we need to be aware of the evolution of security trends, it’s the little things that can still kill us. This point is further explored in my recent guest post in Forbes, which you can...

Kevin Isaac | 17 Sep 2012 | 0 comments

The recent security attacks targeting oil/gas sector in the Middle East have attracted massive public attention and generated headlines in high profile business publications around the world, reminding companies that targeted attacks are not waning, far from it!. These threats continue to be a growing risk for businesses of all sizes and all sectors – no one is immune.

According to Symantec’s Internet Security Threat Report, targeted attacks use customized malware and refined targeted social engineering to gain unauthorized access to sensitive information and have increased from an average of 77 per day in 2010 to 82 per day in 2011. Symantec has also identified a new...