Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
Kevin Isaac | 17 Sep 2012 | 0 comments

The recent security attacks targeting oil/gas sector in the Middle East have attracted massive public attention and generated headlines in high profile business publications around the world, reminding companies that targeted attacks are not waning, far from it!. These threats continue to be a growing risk for businesses of all sizes and all sectors – no one is immune.

According to Symantec’s Internet Security Threat Report, targeted attacks use customized malware and refined targeted social engineering to gain unauthorized access to sensitive information and have increased from an average of 77 per day in 2010 to 82 per day in 2011. Symantec has also identified a new...

Danny Milrad | 16 Sep 2012 | 0 comments

Few people would disagree with the statement that our world is becoming more complex, and this is especially apparent in the data center. With new technology being rapidly adopted, from mobile devices to cloud computing, businesses are struggling to integrate new solutions that promise increased productivity and cost-savings, while managing ever-growing amounts of information. In order to assess how well organizations are dealing with these changes, we developed the 2012 State of the Data Center Survey.

This is the fifth year that Symantec has run the survey.  To highlight how far IT organizations have come in such a short period of time we only need to look back to the complexities and initiatives to simplify....

Symantec Security Response | 06 Sep 2012 | 0 comments

In 2009, we saw the start of high profile attacks by a group using the Hydraq (Aurora) Trojan horse. We've been monitoring the attacking group's activities for the last three years as they've consistently targeted a number of industries. These attackers have used a large number of zero-day exploits against not just the intended target organization, but also on the supply chain manufacturers that service the company in their cross hairs. These attackers are systematic and re-use components of an infrastructure we have termed the "Elderwood Platform". The term "Elderwood" comes from the exploit communication used in some of the attacks. This attack platform enables them to quickly deploy zero-day exploits. The attacking methodology has always used spear phishing emails but we are now seeing an increased adoption of "watering hole" attacks (...

Marian Merritt | 05 Sep 2012 | 0 comments

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects- and increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under ½ of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.

The nature of the crimes is shifting towards the social networks we love and the mobile devices we use constantly. Consumers seem to...

Patricia Titus | 30 Aug 2012 | 0 comments

For many people, owning a dog can be a truly rewarding experience. But it takes careful preparation and hard work for that unruly puppy to grow up into an obedient, faithful companion – without training and discipline, you might end up with chewed-up sneakers and frightened neighbors. And while the corporate data center seems a world away from a backyard kennel, many of the same principles apply when you are bringing new technology into the workplace – the amount of preparation you do will largely determine your success. Of particular concern these days is the growing desire of employees to use their own mobile devices for work. This BYOD (bring your own device) trend is causing concern among IT administrators and senior management alike. But with adequate preparation and management...

Tom Powledge | 29 Aug 2012 | 0 comments

Today’s small and medium-sized businesses are in a unique position. They can now do business globally thanks to online sales, and they can adopt new technologies once reserved for large enterprises due to cost and simplicity. Virtualization in particular is opening up new opportunities for SMBs. But while virtualization is being adopted by an increasing number of businesses, some SMBs may still be unfamiliar with just how virtualization works, and the advantages and challenges it poses.

At its simplest level, virtualization simply creates a pool of shared resources, allowing them to be used more efficiently. Virtualization is most commonly applied to servers, which allows for environments with incompatible requirements to be run on the same server, isolated from each other....

tzambrovitz | 27 Aug 2012 | 0 comments

With IT budgets that are shrinking or barely holding steady, it’s vital for today’s businesses to make the most of their current infrastructure. Fortunately, however, leveraging virtual infrastructure to enable cloud computing is possible without having to rip and replace the entire infrastructure. Whether an organization is replacing legacy technologies or adapting them to virtualization, Symantec and VMware have teamed up to help businesses make the transition to virtualization as smoothly as possible – with approximately 100 points of integration to date.

This integration effort goes beyond simply enabling the technologies to work together, to the IT users themselves. We have developed various integration levels ranging from...

Steve Cullen | 13 Aug 2012 | 0 comments

In today’s rapidly evolving technology landscape of mobile devices, virtualization, and more data than ever, SMBs need information protection to be easy. Symantec understands the challenges that SMBs face and we are dedicated to removing the complexities of information technology so that they can focus on what they do best.

We are on a mission to create offerings that are fast, simple to deploy and use, are cost-effective, and provide the best customer experience possible. As we work towards that goal, we’re not only providing the best solutions for businesses, but also sharing knowledge that helps them achieve success. Being named as one of the Top 100 Champions in the 2012 Small Business Influencer Awards demonstrates our commitment to small businesses.  


John_Brigden | 11 Jul 2012 | 0 comments

The dramatic news that one of the U.K.’s leading financial services organisations had suffered a data outage that led to millions of customers unable to access their accounts should be a wake-up call for every CIO. The event tells them that their operation is entirely dependent on IT and in particular on the IT resources they have to run their systems.

It was once said that financial services can be thought of as a technology business with a financial domain of expertise. Whether or not that is the case, every bank—indeed every business—needs to have in place a watertight disaster recovery that ensures data is continuously available, whatever the scenario. As that major U.K. financial institution is now finding to its cost, the aftermath of a service stoppage can be...

Rich Dandliker | 11 Jul 2012 | 1 comment

In the constant war for information security between businesses and cybercriminals, we are so focused on the faceless, outside enemy that we often fail to recognize potential double agents within our own ranks. With so many resources devoted to preventing hackers and cybercriminals from getting past our external network defenses, it’s easy to neglect internally based intellectual property (IP) theft.

IP theft is staggeringly costly to the global economy: U.S. businesses alone are losing upwards of $250 billion every year. As it turns out, IP thieves are most often either current or former employees.  We trust most of our employees to do the right thing, but the malicious actions of a single person can jeopardize the health of the business and jobs for everyone.  

A research review by Drs. Eric D. Shaw and...