Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally used to refer to all automated or computerised ...
Blog Entry by Ilias Chantzos | 19 Aug 2014 | 0 comments
In data centres across the world the principles of server virtualisation, and their impact on how server resources can be allocated, managed and secured, have been established over the past decade and are now part of mainstream IT.  While ...
Blog Entry by Arnaud_Taddei | 18 Aug 2014 | 1 comment
San Francisco, US Sun, 24 August, 2014 (All day) - Thu, 28 August, 2014 (All day) This year, Symantec ...
Event by Symantec Analys... | 13 Aug 2014 | 0 comments
Las Vegas, NV Tue, 09 September, 2014 (All day) - Thu, 11 September, 2014 (All day) Symantec leaders ...
Event by Symantec Analys... | 04 Aug 2014 | 0 comments
Symantec is in transition and so, too, are the problems that customers are asking us to solve. We believe that the time to simplify and integrate one of the industry’s broadest portfolios is now, refocusing on what’s needed most, in order to fulfil those ...
Blog Entry by Caroline Dennington | 28 Jul 2014 | 0 comments
The recent visit of several industry analysts in Symantec's UK office created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information Fabric Platform that underpins this strategy. ...
Blog Entry by Caroline Dennington | 23 Jul 2014 | 0 comments
Symantec’s unified vision and new array of solutions around its Information Management (IM) offering are propelling customers towards ever greater agility, freedom of choice and the highest levels of security in what is becoming an increasingly complex ...
Blog Entry by Drew Meyer | 17 Jul 2014 | 0 comments
An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.   This question becomes increasingly important when considering software-defined ...
Blog Entry by Sian John | 15 Jul 2014 | 0 comments
An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are seeing the largest increase in targeted attacks. ...
Blog Entry by fbunn | 21 May 2014 | 0 comments
Mobile World Congress was an exciting time for Symantec this year, with so much constructive engagement taking place with many of you from the analyst community, particularly around the key areas of Mobile Device Management (MDM), Mobile Application ...
Blog Entry by tgrandpre | 17 Mar 2014 | 0 comments