Video Screencast Help

Information Unleashed

Showing posts in English
khaley | 08 Nov 2012 | 0 comments

With this year quickly coming to an end, it’s time for us at Symantec to publish our predictions on what we expect will happen in the world of cybersecurity for the coming year.

Most of us at Symantec tend to be fact-based, data-driven individuals. However, predicting the future always involves a bit of speculation. To derive our predictions for 2013, we began by talking to hundreds of security experts at Symantec to gather their thoughts and ideas. Then, we peer-reviewed these ideas, argued a lot, and boiled it all down to a handful of predictions that we felt would provide real insight into where we believe the threat landscape is going.

While these predictions are based on what we see today, they also reflect where we think things are going based on our years of...

fdesouza | 05 Nov 2012 | 0 comments

Ask any IT administrator about the cloud, especially cloud-based applications, and chances are you’ll sense some unease. They see its potential in terms of cost-effectiveness and agility, but express some concerns in terms of security. At Symantec we envision a future, cloud-centric world, where clouds are safe and our solutions provide the protection and control customers need across both public and private clouds.

In this vision, many clouds will be the norm. The user experience will involve a seamless interaction of cloud-based services with constant access to what is needed, when needed, without security concerns. Whether it is access to email archives, sales presentations, or financial reports, secure cloud-based services will enable customers to be more productive wherever they may be.

There are some challenges to overcome before we get to the point where all companies will feel safe migrating enormous...

Cecily Joseph | 29 Oct 2012 | 0 comments

Recently, I had the opportunity to sit down with Symantec CEO Steve Bennett to talk about Symantec’s approach to corporate responsibility. In the course of the conversation, he discussed what he believes responsibility means at Symantec, some of the company’s recent accomplishments, and the challenges to be tackled in the coming year. You can read more about Symantec's approach in our 2012 Corporate Responsibility Report.

Symantec Corp. | 29 Oct 2012 | 0 comments

By Rob Greer, Vice President & General Manager, Enterprise Mobility, Symantec

Over the last few years, we’ve seen an increase in the number of new mobile operating systems. The latest example is Microsoft’s announcement today of the availability of Windows Phone 8. At Symantec, we work to ensure that our customers are able to protect and manage their data, apps, devices and users on all mobile platforms. As such, we’re pleased to announce that Symantec Mobile Management Suite – a single solution that covers mobile device management, mobile application management, and mobile security – now provides support for the new Windows Phone 8 platform.

As users start to access corporate email and other resources with their new Windows Phone 8 devices, businesses will need to protect these activities. The mobile device management component of the suite,...

Symantec Corp. | 22 Oct 2012 | 0 comments

By John Eldh, vice president, channel sales, Americas, Symantec 

Last month, we held our annual Partner Engage conference in Baltimore – my first as the new Symantec Channel Chief – and coming away from that event I am filled with a real sense of excitement about the opportunities, insight and experiences we shared there. As you all know, Symantec is in a state of evolution -- transforming, refining and improving products, services and processes that can make a difference to partners and their customers. Steve Bennett, our new CEO, spoke at the event and outlined a strategy we are calling ‘Symantec 4.0’ that will be marked by tremendous new opportunities for our partners. I’ve been with Symantec for eight years – they’ve all been great years...

khaley | 16 Oct 2012 | 0 comments

By visiting which type of website are you more likely to get infected with malware?  A religious site or an adult site?  I’ve been asking that question to computer security professionals for almost a year now.  If you’ve read the Internet Security Threat report version 17 you know the answer. It’s religious sites.  We discovered that a higher percentage of religious sites have been hacked into and loaded up with malware by the bad guys than adult sites.  

I like to quiz people on this one, because it doesn’t meet expectations.  Some people sense a set up in the question, but most answer that you’re more likely to get infected on a adult website.  The real message I try to leave behind with...

Trevor D. | 15 Oct 2012 | 0 comments

 

A well-run business today is like a good movie: behind the scenes a lot of work is required to ensure that the production stays on track. And for today’s organizations, behind the products and sales is the need to effectively managing all the information that keeps the operation running. The challenge is that the amount of information to manage is increasing by leaps and bounds. And with more information being taken beyond the confines of the network on mobile devices and in the cloud, this is creating significant challenges.

The 2012 Symantec State of Information Survey reveals that with all these additional ways to store and access information, 42 percent of business information is duplicate. Having multiple copies of files is one of the biggest challenges facing...

caroline wong | 12 Oct 2012 | 0 comments

When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since data of all types – including confidential – are being mixed together to generate analytics which can be used for better decision making. But while there are concerns, big data can actually be harnessed to improve security.

The job of the defender is to protect against an infinite number of attacks. However, a defender will always have a limited amount of resources with which to do this. The real job of the security practitioner is to prioritize remediation efforts by risk, so that the limited resources can be focused on addressing the greatest risks to the business.

Most security organizations have anywhere between five and hundreds of different security technologies deployed in their enterprise environments....

Mike Reynolds PMM | 05 Oct 2012 | 0 comments

A few weeks ago, we had a data center go down. In fact we purposely dropped it down 18 stories from a building right in the heart of Silicon Valley.

What happened when this data center went down? First, it made a really, really loud boom, and then it seamlessly failed over to a recovery site. Exactly what a business would need.

Why did we do this?

To demonstrate how organizations can protect their data and applications, and keep their operations running smoothly and their customers happy.

If they do go down, they need to recover – fast.

With increasing adoption of virtualization technologies, customers virtualize applications to reap the benefits these platforms provide. Virtualization enables lower costs in the form of less space requirements, less power needed to run fewer physical servers, lower cooling requirements, etc. But how do they do this while taking the risks of virtualization out...

John_Brigden | 01 Oct 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up...