Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
CJ Desai | 04 May 2012 | 0 comments

By CJ Desai, senior vice president, Endpoint and Mobility Group, Symantec

Symantec’s recent 2012 State of Mobility Survey found that organizations across the globe are embracing mobility at unprecedented rates, driven in part by the “Bring Your Own Device” (BYOD) movement. In fact, according to the survey, 59 percent of enterprises are now making line-of-business applications accessible from mobile devices, and another 71 percent are considering implementing a corporate mobile app store.

So, just why are so many organizations gravitating towards mobility? Increased efficiency, increased workplace effectiveness and reduced time required to accomplish tasks are just some of the answers we hear from our customers. In short, the goal is better...

khaley | 29 Apr 2012 | 0 comments

When it comes to Internet security, organizations shouldn’t feel like it’s only a matter of time before they suffer a catastrophe. But at the same time, it’s important to recognize that there is no single preventive measure that will guarantee safety from all attacks. Unfortunately, there are so many kinds of attacks that it’s difficult for users to know what threats are the most dangerous, and how to stay on top of them, but each can be dealt with individually. Each year Symantec publishes the Internet Security Threat Report to provide users with a better understanding of the threat landscape, and in a sense helps provide an alliance to protect them from being blindsided.

Symantec’s 2011 Internet Security Threat Report reveals that threats are skyrocketing and are...

Marian Merritt | 25 Apr 2012 | 0 comments

With more than 840 million registered users, Facebook has long been everyone’s favorite online location. We update our status, check in to our favorite shops and restaurants, play social games, post family photos and live our lives increasingly in the top global social networking space. With this popularity, Facebook has realized they can do more to help educate members about the best ways to remain protected while enjoying everything Facebook has to offer.

Today, Facebook and Symantec announce a great partnership. Facebook has a security site, the Facebook AV Marketplace, where new-to-Norton Facebook users can download a free 6-month copy of our flagship Norton AntiVirus for either a Mac or a PC. So if you aren’t using any security on your computer, or you’ve wanted to try Norton for free, now is a great time to do so. You can learn more at the ...

Symantec Corp. | 20 Apr 2012 | 0 comments

Symantec President & CEO Enrique Salem is an avid cycler and literature buff, has a background in engineering, and experience leading several startup companies. In this video, Enrique discusses how his personal interests and pursuits have shaped his leadership style and vision for Symantec. Get an inside look at Enrique’s management philosophy in Part 2 of our Exec Q&A Show.

Symantec Corp. | 20 Apr 2012 | 0 comments

Symantec President & CEO Enrique has been at the helm for three years. In this video, Enrique discusses the key successes he has overseen, and how Symantec is responding to IT market trends. Get an inside look at Symantec’s direction & vision in Part 1 of our Exec Q&A Show.

FranRosch | 20 Apr 2012 | 0 comments

Today, the VeriSign seal got a new look and became the new Norton Secured Seal. 

One of the questions we get asked the most is why make this change to one of the most recognized trust marks on the Internet.  Our response, it just makes sense for us and for our customers.  By combining the power of the VeriSign checkmark with the industry’s most respected Norton brand, we are creating the most valued and highly visible security seal on the Internet.  Businesses will experience the same high security standards and protection that was delivered from the previous VeriSign seal.  The rigorous and proven authentication processes ensures their customers and information stays safe and secure.

The Value of a Trust Seal

The Norton Secured Seal is an indispensable tool and is valued by business customers for its proven ability to provide consumers a secure online experience while instilling confidence and trust in their...

Patricia Titus | 17 Apr 2012 | 0 comments

People have the curious ability to get used to almost anything over time. Whether it’s learning to fall asleep to traffic noise or coming to accept wrinkles as we age, we often become comfortable with our situation.

While this adaptability can be a good thing, sometimes it leads to complacency. In the constant fight against cybercrime, for example, becoming comfortable is the last thing people should do. In their quest to steal information, cybercriminals are constantly changing their methods, just like how a human virus evolves in the real world. To keep information safe, we are continuing to evolve new defenses against these attacks. But with so many threats out there – where do you start? Well, don’t try to boil the ocean!

One of the biggest mistakes we see is when organizations secure the endpoint and really lose focus on what really matters, the data! Security means more than protecting your smartphone, laptop or PC. It’s also about the...

Tom Powledge | 12 Apr 2012 | 0 comments

For years businesses have had the desire to adopt new technologies ahead of competitors while avoiding the pains of early adoption of unproven technologies. It’s understandable that we have been hesitant to adopt cloud computing in particular. Many of us have been reluctant to put our business information in the hands of someone else, fearing what would happen in the event of a data breach or outage.

But cloud computing is no longer a new technology full of uncertainty. Many cloud providers have established track records of providing reliable, secure service and high availability, and if you haven’t already, it’s time to take stock of your current IT situation and consider how the cloud can help you....

SeanRegan | 30 Mar 2012 | 0 comments

I continue to be astounded by the sweeping effects of globalization on the world economy. In my current position, I have the opportunity to observe this phenomenon first hand as I visit Symantec customers across the globe. My business travels in far-flung locales frequently remind me of my college study abroad program, which took me to thirteen different countries throughout the world. Bypassing the usual hot spots of France, Italy and Germany I knew I would get to at some point in life, I toured Southeast Asia, South America, central and southern Africa, the Far East, Alaska and the Caribbean. Not only did I have the chance to break down personal cultural barriers and develop an appreciation for different customs, I also acquired an understanding of the legal systems of these nations.  Perhaps my most exciting experience during my travels took...

CJ Desai | 30 Mar 2012 | 0 comments

 

When it comes to protecting your IT resources, endpoint security is a no-brainer. Employing basic protection such as antivirus software has been an integral part of security for so long that endpoint protection seems like one of the few constants in technology.

Except, it isn’t.

Two big trends are changing the way endpoint security is handled. First, the very definition of endpoints is changing. Once the term just meant desktop computers and servers, but it now also encompasses mobile devices such as laptops, smartphones and tablets, as well as virtual servers and desktops – any place corporate data can be accessed. And that data is being stored in more and more places. Gone are the days of a single, fortress-like IT infrastructure protecting all your information...