Video Screencast Help

Information Unleashed

Showing posts in English
MatthewEllard | 12 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part two, Part three.

To conclude our series of blogs on the value of information and IP, we’re going to look at the ways in which information and IP – which has become so valuable to businesses – can be protected.

As the flow of information has shifted beyond the data centre, information management is more important than ever. To minimise information sprawl and its effects on the organisation, businesses can follow a few simple steps:

  • Focus on the information, not the device...
Symantec Corp. | 12 Dec 2012 | 0 comments

By Brian Burch, Vice President of Americas Marketing for SMB at Symantec

Most people agree that small- to medium-sized businesses (SMBs) are a significant source of the innovation that fuels growth, but a lesser recognized fact is the critical role of start-ups in economic recovery. A new report from the Kauffman Foundation indicates that the pace of recovery in hiring and job creation since 2008 is stronger in newer firms – 4 out of every 10 hires at young firms are for newly created jobs.

Supporting small businesses, established and new, in their development and growth is germane to the economy. A major part of small businesses’ success now and in the future will increasingly derive from their business relationships with large corporations. More...

MatthewEllard | 09 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part twoPart four.

In our series of blogs about the value of ideas and IP, we have covered the vital need to protect information and also the instances when protection is not appropriate – either because it hampers business processes or because the data has become old and therefore worthless.

What has become clear is that not all information is equal in value. Some is of very high value while other data can actually represent a cost to a business – either because it has to be stored and protected...

MatthewEllard | 04 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part three, Part four.

In my last post discussing the value of an idea, it was argued that more attention needs to paid to understanding the value of intangible assets – information saved as digital records. A retailer wouldn’t leave its stock in an unlocked warehouse so why would – for example – an industrial designer leave plans and client details open to competitors via an unsecured USB drive or unencrypted email message?

While there are some simple...

Symantec Corp. | 04 Dec 2012 | 0 comments

By Dan Lamorena, Director, Product Marketing, Storage and Availability Management Group

A couple of weeks ago, my colleague Kevin Haley posted the Top Five Security Predictions for 2013. Today we share with you the top storage predictions for 2013.

As we share them, we realize that we don’t have solutions that address all of the facets of these predictions, but it is what we see as major issues addressing the market in the coming year based on our experience and conversations with our customers and partners.

1. Hypervisor market share will dramatically change with greater diversity of virtualization solutions.

The market share of hypervisor vendors will begin to see major changes between the largest...

MatthewEllard | 02 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part two, Part three, Part four.

We live in a knowledge-based economy – where ideas are money. In fact, according to the Intellectual Property Office, the UK design industry alone is worth over £15bn a year to the nation’s coffers.

As a result, it has never been more vital for industry and individuals to protect the fruits of their intellectual labour. This includes customer information, financial or legal records, designs, written articles and records, or any number of other different types of explicit, recorded...

John_Brigden | 27 Nov 2012 | 0 comments

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the...

Symantec Corp. | 20 Nov 2012 | 0 comments

By Sanjay Sawhney, Senior Director of Research at Symantec Research Labs

The technology landscape is rapidly changing into a more mobile and cloud-based world.  And in this world, the end user and servers (services provided to the end user) are ‘virtual’ or decoupled from devices, physical machines and networks.

However, there are a few constants:

  • The user and server have to share a single root of trust with one another (mutual authentication)
  • The data and sharing of the data drives a lot of the end user experience; not the device or the application
  • In this evolving technology landscape, who does what  with any piece of data is the most important aspect of providing security
  • Harnessing the humongous data...
Steve Cullen | 15 Nov 2012 | 0 comments

There’s a lot of talk about cloud security be it (1) security for the cloud, which protects your cloud initiatives such as data stored in the cloud or (2) security from the cloud, also known as security-as-a-service (SecaaS), which uses the cloud to deliver some aspect of protection, like messaging, anti-virus or web security. Though proven and effective, many SMBs overlook SecaaS because the cloud still feels like an unknown for many, and we naturally fear what we don’t understand.

Today, SMBs can’t afford to be dismissive when it comes to security. The harsh reality is SMBs have never been targeted with attacks like they are now. In the first half of 2012,...

Kevin Isaac | 13 Nov 2012 | 0 comments

In a previous blog post I discussed the increased security threats targeting the oil/energy sector.  This changing security threat got me thinking about an organizations’ overall risk posture and the CIOs willingness to accept a certain level of risk – whether it is from malware or a system outage or from an employee who lost a company laptop at the airport.  This week I am attending Symantec’s Vision conference in Barcelona, and during my conversations with CIOs I realize that they have one of the toughest jobs in the world right now.  CIOs have to understand all of the IT risks and then define the...