Video Screencast Help

Symantec Analyst Relations - Private group: members only

Public Group | Founded: 02 Mar 2011 | Serving 76 members

This group hosts detailed presentation materials and other relevant information to support the research of the Industry Analyst community. Please request membership if you would like to access the below materials.


Symantec Analyst Relations Events

EMEA Enterprise Security Strategy Analyst Day, 16th June, Reading UK

  • For event details, click here (Registration required, please join the private group)

APJ Analyst Breakfast, 14th April 2015, Singapore

  • For event details, click here (Registration required, please join the private group)

UK Information Protection Analyst Day, 23rd March 2015, Reading UK

  • For event details, click here (Registration required, please join the private group)

Unified Security Analyst Day, 10th December 2014, Reading UK

  • For event details, click here

Vision Symposium London, 21st – 22nd October, London UK

  • For event details, click here

Vision Symposium Munich, 8th – 9th July, Munich Germany

  • For event details, click here


Symantec Edition - Monthly Webcast for Industry Analysts

We invite you to hear from Symantec experts on a variety of topics for industry analysts. In these one hour sessions, we will articulate Symantec’s strategy around hot topics and trends such as cloud computing, BYOD, information explosion, to name a few as well as host a Q&A session.

Previous Webcasts


Filed Under:

Group Activity

New blog entry 11 Aug 2015
Many of the CISOs I talk to have one top-of-mind issue: How do they deal with the flood of security challenges they’re now facing?  Especially as attackers move ever faster, digital extortion accelerates and malware gets smarter. Add to that the ...
New blog entry 28 Jul 2015
Cyber Security has become a headline-grabbing item, with constant attacks very much the order of the day. The risk any business now faces is that soon it may be the one making the news, not just reading about someone else’s misfortunes. One of the ...
New blog entry 23 Jul 2015
For CISOs operating in today’s cyber environment, the world they face is a difficult and challenged one. Against the imperative to defend their enterprises from increasingly sophisticated and relentless advanced cyber attacks, they must also face the ...
New blog entry 19 Jul 2015
Symantec is embracing an open innovation model to deliver advanced cyber security solutions; we are partnering with Frost Data Capital (FDC) to incubate new startup companies to solve hard problems in Internet of Things (IoT) security and cyber ...
New event 16 Jul 2015
Symantec will be at Black Hat USA 2015 taking place on 1-6 August 2015 in Las Vegas, NV. Join our security researchers and experts as they share their analysis of the latest cyber threats, trends and attackers. Visit Symantec’s booth and learn how ...
New blog entry 13 Jul 2015
What’s the most common user complaint related to security systems implementation? The one that I hear again and again is: "It has slowed down my computer/experience/login." No doubt businesses do start out by planning an appropriate approach to such ...
New blog entry 09 Jul 2015
As Cyber threats and the awareness of the risks these bring hit ever new heights, organisations are looking to move beyond the confines of protection alone to the much wider cycle of cyber security – namely: Prepare, Protect, Detect, Respond and ...
New blog entry 06 Jul 2015
A recent visit to an annual regional security conference left me both somewhat dazed – lots of flashing fire, smoke, red lights and sirens (though no fire engines) – and confused. Because, in amongst the plethora of alerting and analysis technologies, ...
New blog entry 06 Jul 2015
The scale and severity of hacking and cyber-attacks in what has become an increasingly sophisticated and aggressive landscape call for a rapid and effective response. There are many solutions posed, from many quarters, and not a great deal of ...
New blog entry 30 Jun 2015
At Symantec, we are fortunate to be able to engage closely with many different types of organisations across all stakeholders – from board members to end users, CISOs, to administrators, as well as the many roles in between. This affords us a whole ...