Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts in English
Cecily Joseph | 25 Jun 2014 | 1 comment

Yesterday, at the Clinton Global Initiative America meeting in Denver, United States Secretary of State Hillary Rodham Clinton, along with Symantec Senior Vice President, Aled Miles, launched our signature Corporate Responsibility program - the Symantec Cyber Career Connection (SC3).

clinton.png

Over the course of 12 months, Symantec worked with a variety of expert stakeholders, including FSG Social Impact Consultants, a steering committee made up of senior executives from a broad array of key Symantec functions (ranging from Government Affairs to Human Resources to our CTO), as well as incorporated feedback from interviews with 36 internal and 31 external stakeholders.

The multi-stage program will help increase the number and caliber of graduates in cyber careers. SC3 is designed to:...

Matt Cain | 23 Jun 2014 | 1 comment

Transform.png

Integrated backup appliances did not exist in the minds of many backup administrators four years ago when Symantec brought an innovative approach to the backup appliance world: a customer-focused strategy designed to reduce complexity in the crucial but often confounding world of data protection.

Yet these appliances - integrating scalable backup and recovery software, optimized storage and data deduplication in one easy to install and manage package –soon were winning the hearts of enterprises around the globe. Symantec customers adopted the new form factor in big numbers because they saw it saving them valuablebudget and resources that could be put to more strategic use. In fact, enterprises working with Symantec reported an average 39% reduction in operational expenditures (OpEx)...

Alix Hart | 19 Jun 2014 | 0 comments

Alix_Head_ShotJuly2013_0.jpegI grew up in a lot of nightclubs.  That may sound strange, but as a kid with a jazz musician father and a singer and DJ as a mother, I spent many nights listening to amazing music from the corners of lounges and nightclubs.  And, I figured out along the way that what really got the house rocking wasn’t just how good the music was.  Rather, it was the ability for the musicians to connect with the audience.  That was where magic happened.   For the audience, it’s the difference between enjoying an evening out to hear some music, and creating a moment that will be remembered for years to come, where all the feeling rushes back to the time you were there.

These days, as a marketer, the tools of the trade are more fragmented and multiplied than ever before –...

Solange Deschatres | 16 Jun 2014 | 0 comments

Although 2011 was first hailed the “Year of the Data Breach,” it appears that was only the beginning. Last year was truly an exceptional year for data breaches, with more data records lost and stolen than ever before. While cyber-espionage and threats to privacy grabbed the headlines, by the end of the year we were faced with the reality that cybercrime remains the most prevalent and a real security threat to businesses. Huge data heists on companies like Target, LivingSocial and AOL, impacted brand reputations, consumer trust and ultimately the bottom line.

In Symantec’s latest Internet Security Threat Report (ISTR), we found the number of data breaches grew 62 percent from 2012, translating to more than 552 million identities exposed last year – an increase of 368 percent. This was also the first year that the top eight data breaches each resulted in the loss of tens of millions of...

Pablo S | 02 Jun 2014 | 0 comments

Solve_for_Connect.jpg.jpeg

Backup Exec 2014: “The backup and recovery gold standard”

We are very excited that we announced general availability for Backup Exec 2014 today. This release delivers the protection you need for your virtual and physical environments.

When we began development of Backup Exec 2014, we started by talking to you – our valued customers and partners from all around the world. As a result, this is the release you asked for.

You told us your ideal solution would offer:

  • Powerful backup and restore performance
  • Flexible and broad platform support
  • An easy-to-use user interface and seamless migration capabilities

And, this is what we’ve delivered with Backup Exec 2014. We kept what...

piero_depaoli | 16 May 2014 | 0 comments

With our constant internet usage and plethora of devices, there is more information being generated and shared online than ever before. As a result, the focus of cybercriminals has shifted and antivirus is no longer enough to protect against their sophisticated attacks. Symantec led the first era of security with antivirus, and it continues to be an important part of our portfolio, but the internet security landscape has changed a lot since then, and you must implement more than antivirus to meet the challenges of today’s threats.

AV software, which is used to prevent, detect and remove or disarm malicious computer programs and malware threats, is not sufficient protection on its own because it only protects against the bad software that we already know exists. Essentially, antivirus is only a reactive technology. We have to know about a threat to write a detection for it. So, although AV does a good job of catching new variants of existing threats, it doesn't catch...

Alix Hart | 02 May 2014 | 0 comments

Unilever, PepsiCo, Time Inc. They are all part of my journey as a marketer in big parent companies with multiple, unique brands.  How do you relate parent master brands with their portfolio?  Do you intertwine or keep identities separate? Do you use multiple logos or one identifying image?  It usually comes down to long-term strategy and the brand perceptions you hope to evolve, but they are choices that require intense commitment, because no study can point you to one “right” decision.   And with Symantec, it’s an opportunity like no other.

Symantec has two brands, one identity, and countless opportunities. That is, if we can communicate our unique value - right now - as the partner to turn to for information protection.  Here’s the challenge. Norton, known for security, is a brand with strong awareness with consumers.  Symantec, has less awareness but a solid reputation in information security and management, which is a big opportunity in...

Solange Deschatres | 25 Apr 2014 | 0 comments

This blog was authored by Con Mallon, Sr. Director of Product Management, Mobility Solutions, at Symantec.

Symantec recently published an updated version of Norton Spot in Google Play (US-English only), and with it, turned the traditional Android mobile security model on its head with a new take on how we use our Mobile Insight technology.

Norton Spot is running a beta app that scans for problematic apps before you download them to your device. There are many mobile security products for Android, all of which take a similar approach when it comes to scanning apps for malware and privacy: the customer downloads and installs the app from an app store and at the point of installation, the mobile security product scans the app and notifies the user as to whether it is malicious. There is also a smaller subset of these products, including Norton...

Manny_Kostas | 23 Apr 2014 | 0 comments

Ubiquity, freedom, possibility: what it means to protect information.

When information is safe, that’s when the possibilities of that information are unleashed.

At Symantec, we are in a unique position to enable businesses to create, build, and succeed.

More than merely keeping attackers at bay, Symantec allows information to be used, shared, and created free from the kinds of worry and apprehension that stifle innovation.

Our understanding of the threat landscape necessitates a new conversation about holistic information protection. This is the conversation we started with our new “Do It All” video, and one we hope to continue throughout the coming months. We encourage you to continue telling us your experiences, goals, and thoughts about information protection. After all, this is a conversation and not a monologue, and the greatest human enterprises are only possible...

Kevin Haley | 01 Apr 2014 | 0 comments

At one point, it seemed like we might never be able to stop counting. It was January and we had begun to collect data on breaches from the previous year. Up to that point, it had been an unexceptional year, as far as breaches go, with numbers in line with previous years. And then the reports of breaches from the end of 2013 started coming in. When we were finally able to stop counting, the results, as published today in the Internet Security Threat Report, were stunning. More than 552 million identities had been exposed. And the average number exposed in each breach was 4 times greater than in 2012. 2013 was the year of the “Mega Breach.”

Of course, other things happened in 2013 and we report on them, as well. For instance, targeted attacks grew 91 percent. Another big number. But it’s the numbers behind this number that are even more interesting. These attacks became slow and low as attackers increased the number of...