Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
CIO Digest
Showing posts in English
| 29 Apr 2013 | 0 comments

 

Location: 

 Webcast: At your own desk

Time: 

 Wed, 08 May, 2013 - 11:00 - 12:00 PDT

When Hurricane Sandy rocked the East coast, it did more than just damage homes, erode beaches, and flood cities. Vital data was lost, critical services went down, and system availability was compromised. Don’t let your organization face the same issues when disaster strikes next. Join us on May 8 at 11 a.m. PDT for a live video webcast from the Symantec CIO Forum & NASDAQ Closing Bell Ceremony where we will delve into the lessons businesses and organizations learned in the wake of Hurricane Sandy. Symantec President of Products and Services Francis deSouza along with a panel of senior IT professionals will discuss some of the best practices IT organizations used to keep services highly available and data secure in the...

| 11 Mar 2013 | 0 comments

As Tablets, laptops, and smart phones infiltrate the enterprise in droves, addressing issues associated with mobility fall upon IT. Further complicating the issue is the Bring Your Own Device (BYOD) revolution. Being overwhelmed by a plethora of security risks, IT organizations find themselves in a balancing act that addresses both personal and business needs, while simultaneously increasing security, improving productivity, and satisfying employees. To tackle these complex issues, Symantec has suggested “Five Pillars of Mobility” to consider. These suggested “pillars” are: Ensuring secured access to apps, protecting apps and data, device management, threat protection, and secure file sharing. When combined with one of Symantec’s Mobility Solutions, IT organizations can successfully overcome the potential security risks that mobility presents. To learn more about Symantec’s complete portfolio of mobile solutions that enable mobile productivity...

| 13 Feb 2013 | 1 comment

Wondering what the best practices for moving archived content are? Join Symantec for a webcast on February 19th at 10 a.m. PST to find out exactly what strategy your organization should take. Our webcast will cover tips and tricks for monitoring a successful migration process and how to successfully navigate the migration process from planning to implementation. We’ll also address the best practices for the preparation and movement of archived content from a legacy archive to market leading Enterprise Vault and Enterprise Vault.cloud archive platforms. Let Symantec help make your migration easier. Register today!

Esther Aladieff | 28 Jan 2013 | 0 comments

With natural disasters, such as Hurricane Sandy, many organizations are rethinking their disaster recovery readiness. To thwart impending disasters, Symantec and Intel jointly designed NetBackup Appliances to reduce the operational costs associated with protecting enterprise data. These all-in-one integrated backup appliances can protect both virtual and physical workloads while also leveraging snapshots and replication. NetBackup appliances also feature built-in Automatic Image Replication to bring down RTO. To learn how to be better prepared with backup and recovery, join our webcast on February 5th at 10 am PST. Register now and be prepared with Symantec!  

Esther Aladieff | 22 Jan 2013 | 0 comments

At Symantec Corporation, we needed to address internal audit concerns about potentially sensitive information stored on laptops and desktop PCs. To address this issue, we deployed our own drive encryption solution on a global scale. Results include successfully mitigating risk of data loss, approaching 95% user compliance rate companywide, streamlined audit process, encryption runs in the background so employees can stay productive, and integrated with Microsoft Active Directory for single sign-on efficiency and end user simplicity. Yes, here at Symantec we do “eat our own cooking,” and as a result we’ve enhanced both information security and compliance. To learn more about Symantec’s implementation of our in-house encryption solution, read this article.

Esther Aladieff | 02 Jan 2013 | 0 comments

It's no secret that disaster recovery is all too often an after-thought for most companies. Yet, when natural disasters like Hurricane Sandy happen, IT organizations have to reevaluate their practices and modernize backup. Further, as more critical business processes move towards automation, the spotlight is on IT resiliency for delivering the required uptime for systems and applications. The more accessible alternative for many IT organizations currently is to back up critical systems to tape and in turn, ship the tapes to a remote location. Not only is this practice obsolete, it’s also risky, inefficient, and costly. The solution is Symantec NetBackup which automates and accelerates disaster recovery practices, while improving service level agreements and reducing costs. This solution also essentially eliminates redundant data. To learn more, check out this link.

Esther Aladieff | 12 Dec 2012 | 0 comments

According to Symantec's 2011 Internet Security Threat Report, the sheer number of attacks has soared 81% since 2010, reaching 5.5 billion. Malware, in particular, is a major source of concern. Malware authors have shifted tactics, away from mass distribution of a single strain that hits millions of PCs, to a micro distribution model where far more unique variants are created. To combat this problem and help organizations cope with a constantly changing and ever-complex threat landscape, Symantec will release Endpoint Protection 12.1.2 later this year. This solution is built on an eco-system of security technologies, including new behavioral and reputation-based protection. To learn more about Symantec’s Endpoint Protection 12.1.2, check out this article.

Esther Aladieff | 23 Oct 2012 | 0 comments

Join us on Thursday, October 25 at 10 a.m. PDT and learn how Symantec Messaging Gateway 10.0 can help you protect and cleanse the flow of your company’s environment. In this webcast you will find out how to effectively prevent spam and malware from reaching your employees’ inboxes, keep your confidential data from leaving, and ensure that inbound and outbound email hygiene is as clean as possible. Register Today!

Esther Aladieff | 19 Oct 2012 | 0 comments

As the adoption of mobile devices continues to proliferate the marketplace and employees want to be able to use the latest and greatest technologies, companies are facing a host of new security challenges that need to be addressed with the same rigor reserved for traditional IT infrastructure in order to mitigate business risk. In this article, Symantec offers a number of recommendations for organizations to consider as they implement mobile device management strategies and adopt BYOD programs. Check out this article to learn more.

Esther Aladieff | 16 Oct 2012 | 0 comments

The October 2012 issue of CIO Digest is now available. The issue includes an exclusive interview with Sealed Air's VP and CIO Warren Kudman who elaborates on the company's strategic approach to risk management. Don't miss the Exec Q&A with Symantec CISO and VP Patricia Titus, features on business-critical virtualization and the changing role of the CISO. Download the issue today!