Video Screencast Help

Information Unleashed

Showing posts in English
John Eldh | 22 Nov 2013 | 0 comments

Last week at our annual North America Partner Engage event, we pulled back the curtain on Symantec’s new Global Channel Strategy and shared how we are changing the way we go to market. We have committed to delivering more than 5 percent organic revenue growth with operating margins better than 30 percent, and we can’t achieve this goal without our partners. I’d like to take this opportunity to share more details about the new Global Channel Strategy and explain how it represents an important step forward in Symantec’s 4.0 journey.

But first, let me take a brief step back to provide some context around how we got to this point. When Steve Bennett, our CEO, joined Symantec over a year ago, he embarked on a global listening tour where partners, customers and employees voiced a need for Symantec to change. He learned that Symantec had great technology and great people, but we needed to do more to help our customers solve their bigger jobs. In addition,...

Rose Quijano-Nguyen | 21 Nov 2013 | 0 comments

As high-profile information leaks and cybercrimes proliferate, government agencies face the tall responsibility of protecting increasing amounts of data from progressively complex threats. One important way governments are doing this is by creating and continuing to update rigorous security standards by which all of their information systems must comply. In the United States, two leading Symantec products that keep information systems safe–Symantec Shared Service Provider PKI and  Symantec Non-Federal Shared Service Provider PKI Service – received a critical U.S. government certification for use by federal agencies and their contractors.

The products received a FISMA certification, which is...

khaley | 19 Nov 2013 | 0 comments

Whispers.

The secret to predicting the future is to listen for the whisper.

By the time you’ve heard things in a loud, clear voice they have already come true. I’ve been listening to the whispers in 2013 and have a pretty good idea for what we’ll be hearing loud and clear in 2014. Below are my predictions of the top things we’ll hear and what they will mean for us in 2014.

  • People will finally begin taking active steps to keep their information private.
  • Scammers, data collectors and cybercriminals will not ignore any social network, no matter how “niche” or obscure.
  • The “Internet of Things” becomes the “Internet of Vulnerabilities.”
  • Mobile apps will prove that you can like yourself too much.

“Wait a minute…The Internet knows more about me than my own mother?”

People will finally begin taking active steps to keep...

Steve Trilling | 15 Nov 2013 | 1 comment

 

Defending against sophisticated targeted attacks is now the norm, and it’s not just large companies that are being impacted. These state-sponsored attackers are going after smaller companies now too.  Why is that?  Well, small companies often have business relationships with larger companies that may be the ultimate target of attackers. And, because small companies may have fewer security safeguards than their larger partners, they make a good target for attackers.  So how can businesses – large and small – protect themselves against these sophisticated, targeted attacks?

The answer is through a combination of cutting-edge security technology and a vast intelligence network that monitors our Symantec customers’ networks, and the attackers, around the clock. Our aim is to block attacks no matter what their target is or how they try to get in – at your gateway, on the endpoint and in...

Steve Bennett CEO | 04 Nov 2013 | 0 comments

   It was a pleasure for Symantec to join John Chambers on stage in New York today for Cisco’s Application Centric Infrastructure (ACI)  and Nexus 9000 series launch. ACI represents a big step forward for our industry, enabling IT to automate provisioning of applications down to the network layer, and monitor the health of those applications from the infrastructure up – all through a single pane of glass.
    Symantec is partnering with Cisco to deliver a more secure, compliant and highly available infrastructure for applications and data. We’ll provide the security customers need in such a dynamic environment, including protection against advanced threats — securing their applications and data wherever they are stored...

Rose Quijano-Nguyen | 15 Sep 2013 | 0 comments

By Dr. Rose Quijano-Nguyen, Principal Certification Strategist – Global Vertical Offerings, Symantec Corp.

As remote working arrangements and “bring your own device” programs become more and more common, both the public and private sectors have an increasing need to protect confidential data on mobile devices against mounting cybersecurity threats. Symantec App Center is a mobile application and content management solution that secures corporate data on iOS and Android mobile devices. To allow the public sector to take advantage of the latest mobile technologies in a secure manner, the Symantec App Center Cryptographic Module recently achieved a certification known as the Federal Information Processing...

Cecily Joseph | 13 Sep 2013 | 0 comments

I’m excited to share that our Corporate Responsibility Report for fiscal year 2013 has been published. This annual report provides an opportunity to review our goals from the previous year, acknowledge successes, and reflect on how we can continue to refine our corporate responsibility strategy. We hope that you will take a look and let us know what you think (in exchange for your opinions, we're giving you a chance to vote on how we should direct a $50,000 USD grant - so be sure to visit our stakholder feedback survey!)

We're also hosting our first-ever...

khaley | 03 Sep 2013 | 0 comments

If it’s worth doing, it’s worth doing on the Internet. And it’s not just Silicon Valley startups that feel this way – cybercriminals do, too. In fact, most types of cons and crimes have migrated to the Internet. Nigerian prince scams remain alive and well, finding more willing victims. Robbing banks is now done with a mouse. And in 2012, we saw that kidnapping (called “ransomware,” and in this case holding your computer hostage) finally became viable on the Internet.

At this point, which crimes haven’t gone digital? Well, fortunately technology barriers still remain when it comes to crimes of violence (though some might argue that a DDoS attack comes close), but you might be surprised to learn that blackmail is gaining traction on the Internet.

In February, the Singapore Police sent out a notification warning of a rather tawdry blackmail scam. In essence, female scam artists secretly recorded online sessions with male victims...

Stephen Gillett | 24 Jul 2013 | 0 comments

Gears.jpgSymantec already has some of the strongest talent in the industry and that roster is growing – including several new senior executive roles that I’m very excited to announce today. These new team members will bring a fresh perspective and help drive innovative thinking as we solve critical customer problems.

One of the most important objectives for any leader is to build a strong and empowered team; if you do this right, I believe you can accomplish greatness. Joining us from other innovative technology brands like Google, Amazon and Microsoft, these new leaders share this team-building philosophy and possess deep expertise in areas spanning security, cloud, end-user sensibility and customer experience.

Symantec welcomes:

  • Manny Kostas, Chief Marketing Officer (CMO) will be leveraging a broad base of...
ketan_shah | 14 Jul 2013 | 1 comment

data insight.jpgDark Data.

The term may sound ominous and mysterious, like something out of deep space. Analyst firm Gartner defines dark data as "the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes. Similar to dark matter in physics, dark data often comprises most organizations' universe of information assets."

Today we are announcing Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data, which is generally poorly managed and stored. Many data centers literally have petabytes of unstructured...