Video Screencast Help

Information Unleashed

Results for Information Unleashed

With this year quickly coming to an end, it’s time for us at Symantec to publish our predictions on what we expect will happen in the world of cybersecurity for the coming year. ...
Blog Entry by khaley | 08 Nov 2012 | 0 comments
Recently, I had the opportunity to sit down with Symantec CEO Steve Bennett to talk about Symantec’s approach to corporate responsibility. In the course of the conversation, he ...
Blog Entry by Cecily Joseph | 29 Oct 2012 | 0 comments
By Rob Greer, Vice President & General Manager, Enterprise Mobility, Symantec Over the last few years, we’ve seen an increase in the number of new mobile operating systems. The latest example is Microsoft’s announcement today of the ...
Blog Entry by Symantec Corp. | 29 Oct 2012 | 0 comments
By John Eldh, vice president, channel sales, Americas, Symantec  Last month, we held our annual Partner Engage conference in Baltimore – my first as the new Symantec ...
Blog Entry by Symantec Corp. | 22 Oct 2012 | 0 comments
By visiting which type of website are you more likely to get infected with malware?  A religious site or an adult site?  I’ve been asking that question to computer security ...
Blog Entry by khaley | 16 Oct 2012 | 0 comments
A well-run business today is like a good movie: behind the scenes a lot of work is required to ensure that the production stays on track. And for today’s organizations, behind the products and sales is the need to effectively managing all the ...
Blog Entry by Trevor D. | 15 Oct 2012 | 0 comments
When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since data of all types – including confidential – are ...
Blog Entry by caroline wong | 12 Oct 2012 | 0 comments
A few weeks ago, we had a data center go down. In fact we purposely dropped it down 18 stories from a building right in the heart of Silicon Valley. What happened when this data center went down? First, it made a really, really loud boom, and ...
Blog Entry by Mike Reynolds PMM | 05 Oct 2012 | 0 comments
Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they ...
Blog Entry by John_Brigden | 01 Oct 2012 | 0 comments
In recent years there has been no shortage of news on highly sophisticated threats that are evading detection for long periods, causing serious damage to organizations and stealing valuable information. These are often directed at defense or other ...
Blog Entry by khaley | 20 Sep 2012 | 0 comments