Video Screencast Help

Information Unleashed

Results for Information Unleashed

In a previous blog post I discussed the increased security threats targeting the oil/energy sector.  This changing security threat got me thinking about an organizations’ overall risk posture and the CIOs willingness to accept a certain level ...
Blog Entry by Kevin Isaac | 13 Nov 2012 | 0 comments
Symantec’s first State of Information report examined how organizations are dealing with information today, in light of significant changes in the data center. Symantec’s Digital Information Index sheds light on where information is being ...
Blog Entry by Dean Gonsowski | 12 Nov 2012 | 0 comments
With this year quickly coming to an end, it’s time for us at Symantec to publish our predictions on what we expect will happen in the world of cybersecurity for the coming year. Most of us at Symantec tend to be fact-based, data-driven individuals. ...
Blog Entry by khaley | 08 Nov 2012 | 0 comments
Recently, I had the opportunity to sit down with Symantec CEO Steve Bennett to talk about Symantec’s approach to corporate responsibility. In the course of the conversation, he discussed what he believes responsibility means at Symantec, some of the ...
Blog Entry by Cecily Joseph | 29 Oct 2012 | 0 comments
By Rob Greer, Vice President & General Manager, Enterprise Mobility, Symantec Over the last few years, we’ve seen an increase in the number of new mobile operating systems. The latest example is Microsoft’s announcement today of the ...
Blog Entry by Symantec Corp. | 29 Oct 2012 | 0 comments
By John Eldh, vice president, channel sales, Americas, Symantec  Last month, we held our annual Partner Engage conference in Baltimore – my first as the new Symantec Channel Chief – and coming away from that event I am filled with a real sense ...
Blog Entry by Symantec Corp. | 22 Oct 2012 | 0 comments
By visiting which type of website are you more likely to get infected with malware?  A religious site or an adult site?  I’ve been asking that question to computer security professionals for almost a year now.  If you’ve read the Internet Security ...
Blog Entry by khaley | 16 Oct 2012 | 0 comments
  A well-run business today is like a good movie: behind the scenes a lot of work is required to ensure that the production stays on track. And for today’s organizations, behind the products and sales is the need to effectively managing all the ...
Blog Entry by Trevor D. | 15 Oct 2012 | 0 comments
When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since data of all types – including confidential – are ...
Blog Entry by caroline wong | 12 Oct 2012 | 0 comments
A few weeks ago, we had a data center go down. In fact we purposely dropped it down 18 stories from a building right in the heart of Silicon Valley. What happened when this data center went down? First, it made a really, really loud boom, and ...
Blog Entry by Mike Reynolds PMM | 05 Oct 2012 | 0 comments