Video Screencast Help

Symantec Analyst Relations - Private group: members only

Public Group | Founded: 02 Mar 2011 | Serving 75 members

This group hosts detailed presentation materials and other relevant information to support the research of the Industry Analyst community. Please request membership if you would like to access the below materials.

 

Symantec Analyst Relations Events

EMEA Enterprise Security Strategy Analyst Day, 16th June, Reading UK

  • For event details, click here (Registration required, please join the private group)

APJ Analyst Breakfast, 14th April 2015, Singapore

  • For event details, click here (Registration required, please join the private group)

UK Information Protection Analyst Day, 23rd March 2015, Reading UK

  • For event details, click here (Registration required, please join the private group)

Unified Security Analyst Day, 10th December 2014, Reading UK

  • For event details, click here

Vision Symposium London, 21st – 22nd October, London UK

  • For event details, click here

Vision Symposium Munich, 8th – 9th July, Munich Germany

  • For event details, click here

 

Symantec Edition - Monthly Webcast for Industry Analysts

We invite you to hear from Symantec experts on a variety of topics for industry analysts. In these one hour sessions, we will articulate Symantec’s strategy around hot topics and trends such as cloud computing, BYOD, information explosion, to name a few as well as host a Q&A session.

Previous Webcasts

 

Group Activity

Show:
New blog entry 26 Feb 2014
It can often seem that security measures exist to stop people from doing things, or to try to catch them out if they do. Across organisations, an broadening range of mechanisms can be used to ensure staff are not breaking the rules - raising the ...
New blog entry 24 Feb 2014
One of the central challenges of what has been termed 'consumerization' is how to balance the benefits experienced by employees using their own devices and applications, with the inherent risks to the business of doing so. The bottom line is one ...
New blog entry 20 Feb 2014
As a wise man once said, “Never put down to malice what can be ascribed to stupidity.” This adage could easily be applied to the founders of ‘hackers for hire’ web site needapassword.com, who were arrested  by the FBI on (strong, it has to be ...
New blog entry 13 Feb 2014
Virtualisation brings enormous benefits to organisations everywhere, fundamentally altering the way in which they do business. It’s not a new concept, of course, but we are now seeing it being applied across areas that go way beyond simply machines and ...
New blog entry 12 Feb 2014
It’s still early days for the Internet of Things (IoT). While some are suggesting a complete revolution in 'smart' physical objects which will change our lives, I don’t think anyone will notice that much of a difference in the short term. Even so, ...
New blog entry 28 Jan 2014
While I am generally upbeat about the latest developments in technology, it's also my job to be cynical. Symantec’s customers depend on a certain level of realism, so I don’t feel too bad about pointing out some of the downsides and ...
New blog entry 23 Jan 2014
This Blog was originally posted in Security Response. Could your baby monitor be used to spy on you? Is your television keeping tabs on your viewing habits? Is it possible for your car to be hacked by malicious attackers? Or could a perfectly innocent ...
New blog entry 22 Jan 2014
As fans of Formula 1 eagerly await the new season, big changes are coming that will have a major impact on the sport. It’s something that Lotus F1 Team readily acknowledges will be a huge challenge. But they will be ready to take on whatever comes ...
New blog entry 17 Jan 2014
FireEye’s recent acquisition of incident response and forensics specialist Mandiant for around $1 billion has been a real high profile eye catcher. The move greatly broadens the FireEye product and services portfolio, of course, although the cost of ...
New blog entry 16 Jan 2014
Having conducted my entire career in the world of information technology, I (like the majority of my peers) am very used to and inspired by questions that begin with “could we..?”. The technology arena exists, is focused on and is inspired by the art ...