Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
khaley | 29 Jun 2012 | 0 comments

Now is not the end. It is not even the beginning of the end. But it is, perhaps, the end of the beginning. Apologies to Winston Churchill, but recent events make this quote seem quite appropriate. Despite the initial hype, Flamer does not indicate the end of the world is upon us. Flamer actually indicates the end of the beginning.

It is the end of ignoring the risk of malware stealing your information. Hopefully. Flamer is completely over the top in how it steals information. But it’s certainly not the first piece of malware designed to steal information. There are thousands of them. Flamer is unlikely to be targeted at you. But one of those other ones probably is.

It is the end of antivirus...

Symantec Corp. | 12 Jun 2012 | 0 comments

By Brian Burch, vice president of marketing communications, Symantec

We’ve all heard about how regular forest fires clear the way for new life, making a healthier ecosystem overall. And if there is a silver lining to be found in the struggling global economy of the last few years, it’s the emergence of a new breed of entrepreneurs who are utilizing the latest technology to effectively compete in today’s challenging business environment. These “accidental entrepreneurs” found themselves in a difficult economic situation and decided to make their own opportunities.

The millions of white-collar workers who were laid off between 2008 and 2011 certainly play a big part in rising global unemployment, which is now totals 27 million more people than on the eve of the global economic crisis in 2007. But a subset of these individuals, those who founded small businesses in the wake of the economic crisis, are a positive and growing force...

Tim_Matthews | 12 Jun 2012 | 1 comment

In a recent court case U.S. v. David Nosal, Judge Alex Kozinski ruled that the Computer Fraud and Abuse Act (CFAA), the nation’s anti-hacking law, applies to people accessing data by circumventing technological access barriers, but it does not extend to employees violating their employer’s restrictions on the use of that information. Under the new interpretation, an employee who has valid credentials to access company data and then misuses that data, however inappropriately, cannot be prosecuted under the CFAA. However, an employee who has valid credentials to access a company computer, but hacks into company data for which he does not have authorization can be prosecuted under CFAA.

The reason for the new interpretation, according to the ruling summary, was that using the CFAA to take action against employees that violate use restrictions could lead to...

John_Brigden | 07 Jun 2012 | 0 comments

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications...

Guido Sanchidrian | 24 May 2012 | 2 comments

The last few days I spent some time to digest the latest Symantec Internet Security Threat Report Volume 17. This comprehensive report provides an overview and analysis of the year 2011 in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.

I am an active member of the Cloud Security Alliance Mobile Working Group, where we actually do research on secure mobile endpoint computing, which will result into valuable guidelines to be published this year. Therefore my Threat Report reading was likely shorten through the lens of...

Steve Cullen | 18 May 2012 | 0 comments

One of the great challenges businesses face today is enabling productivity by giving people access to the resources they need, without compromising the safety of that information. And while it’s not always easy to see the risks, recent events have made it obvious that disaster can strike at any time, in many different ways. It’s vital for organizations of all sizes to have a plan in place to keep their business operational when things go wrong.

Complicating the situation are several megatrends that are having a significant impact on IT today: namely, virtualization, cloud and mobility. These technologies are giving even small businesses the flexibility they need to compete better in a global market, but how are they affecting our ability to...

bduckering | 17 May 2012 | 0 comments

In October of 2010, Symantec publicly announced its mobile protection strategy, defining a new era in how Symantec secures and manages the information and identities of consumers, businesses and governments in an increasingly mobile world. At its core, the announcement laid out our protection strategy and approach for enterprises, consumers and communication service providers.

That approach is still at the core of how Symantec is addressing the larger mobility trend. However, we continue to strengthen and refine our approach as advancements in mobility develop and changes to the mobile threat landscape evolve. In that regard, Symantec announced some significant advancements to its overall mobile strategy in February of this year and demonstrated that we have delivered on our mobile strategy. Some of those advancements hinged on the acquisition of Odyssey Software.

Odyssey...

Tim_Matthews | 15 May 2012 | 0 comments

U.S. companies are paying more to notify people impacted by data breaches, according to the 2011 Cost of a Data Breach Study: United States. The average cost to notify victims of breach increased in this year’s study from approximately $510,000 to $560,000. At the same time, the average size of a breach is down 16 percent and the costs associated with the detection and escalation of data breach events declined as well, suggesting that companies may be more efficient in investigating data breaches.

So, if companies are better at detecting breaches and breaches involve fewer records, why are notification costs continuing to creep up?

The...

SeanRegan | 07 May 2012 | 0 comments

 

Nearly two years ago, an analyst at Gartner said that the industry was facing what he called “The Broken State of Backup.” Backup has been around for more than a half of a century and is an essential task for a majority of organizations. Companies can’t afford to go without backing up their data and systems. Yet the analyst wrote that “the perceived level of cost and complexity [of backup] is rising dramatically.”

The information explosion, the emergence of virtualization, and increasing demands for 24/7 access to data have contributed to rising cost and complexity. A Symantec survey of 1,400 IT professionals showed a fragmented world of backup solutions with organizations averaging up to seven...

CJ Desai | 04 May 2012 | 0 comments

By CJ Desai, senior vice president, Endpoint and Mobility Group, Symantec

Symantec’s recent 2012 State of Mobility Survey found that organizations across the globe are embracing mobility at unprecedented rates, driven in part by the “Bring Your Own Device” (BYOD) movement. In fact, according to the survey, 59 percent of enterprises are now making line-of-business applications accessible from mobile devices, and another 71 percent are considering implementing a corporate mobile app store.

So, just why are so many organizations gravitating towards mobility? Increased efficiency, increased workplace effectiveness and reduced time required to accomplish tasks are just some of the answers we hear from our customers. In short, the goal is better...