Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts tagged with symantec
Showing posts in English
Alix Hart | 02 May 2014 | 0 comments

Unilever, PepsiCo, Time Inc. They are all part of my journey as a marketer in big parent companies with multiple, unique brands.  How do you relate parent master brands with their portfolio?  Do you intertwine or keep identities separate? Do you use multiple logos or one identifying image?  It usually comes down to long-term strategy and the brand perceptions you hope to evolve, but they are choices that require intense commitment, because no study can point you to one “right” decision.   And with Symantec, it’s an opportunity like no other.

Symantec has two brands, one identity, and countless opportunities. That is, if we can communicate our unique value - right now - as the partner to turn to for information protection.  Here’s the challenge. Norton, known for security, is a brand with strong awareness with consumers.  Symantec, has less awareness but a solid reputation in information security and management, which is a big opportunity in...

Stephen Gillett | 24 Jul 2013 | 0 comments

Gears.jpgSymantec already has some of the strongest talent in the industry and that roster is growing – including several new senior executive roles that I’m very excited to announce today. These new team members will bring a fresh perspective and help drive innovative thinking as we solve critical customer problems.

One of the most important objectives for any leader is to build a strong and empowered team; if you do this right, I believe you can accomplish greatness. Joining us from other innovative technology brands like Google, Amazon and Microsoft, these new leaders share this team-building philosophy and possess deep expertise in areas spanning security, cloud, end-user sensibility and customer experience.

Symantec welcomes:

  • Manny Kostas, Chief Marketing Officer (CMO) will be leveraging a broad base of...
ketan_shah | 14 Jul 2013 | 1 comment

data insight.jpgDark Data.

The term may sound ominous and mysterious, like something out of deep space. Analyst firm Gartner defines dark data as "the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes. Similar to dark matter in physics, dark data often comprises most organizations' universe of information assets."

Today we are announcing Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data, which is generally poorly managed and stored. Many data centers literally have petabytes of unstructured...

Symantec Corp. | 24 Apr 2013 | 0 comments

We spend a lot of time talking about our company goals, offerings, marketing and sales, and the Symantec 4.0 transition. As a global company with employees in more than 50 countries, we have the unique ability to address some of society's biggest challenges as part of our business goals... we also have a bigger responsibility to make our world better.

Over the past several months, I’ve talked about corporate responsibility a lot internally – we’re  striving for corporate responsibility leadership. But right now, I'd like to focus on one aspect of corporate responsibility and talk about what our employees are doing to contribute to our local communities. Last fiscal year, we set a goal to raise our employee volunteering hours by 20 percent.

Research has shown...

khaley | 15 Apr 2013 | 0 comments

Targeted_Attacks_in2012_1280x394.jpgSome of us are numbers people.  We like nothing more than digging into a big batch of numbers.  I confess I’m the other type of person. I still fumble around a spreadsheet and can’t add without the aid of a calculator. For numbers people the ISTR is a terrific document. This year’s report is 160 pages of numbers that do a pretty good job of describing the threat landscape. If you’re a numbers person, feel free to dig in to the full report. You can also check out highlights in this graphic.

If you’re like me, and not really a numbers person, then read on. I’ve bullied my way through the numbers so you don’t have to. Let me give you the highlights, some of the interesting...

Tim_Matthews | 13 Mar 2013 | 0 comments

The show floor at RSA was buzzing with discussion of attacks against critical infrastructure and state-sponsored attacks – the words hactivist and A.P.T. were uttered frequently.  But, while cyber-espionage was making headlines from the show, Symantec took the opportunity to survey information security pros on insider issues related to data access and mobility. The findings show that although 76 percent of businesses saw cyberattacks in the past year, increased use of mobile devices is making the insider threat more relevant than ever before.

It should come as no surprise that the top three motivators for the move to mobility are: business drivers, user demand and financial...

RobertHamilton | 06 Feb 2013 | 0 comments

fren·e·my [fren-uh-mee] noun. Someone who is both friend and enemy, a relationship that is both mutually beneficial or dependent while being competitive, fraught with risk.

When it comes to taking your intellectual property (IP), employees are the less obvious player but they can be frenemy #1. In many cases, these trusted employees are moving, sharing and exposing sensitive data in order to do their daily jobs. In other instances, they are deliberately taking confidential information to use at their next employer. It’s not that these employees are inherently malicious – often they just don’t know it is wrong to do so.

According to a new Symantec survey...

Symantec Corp. | 23 Jan 2013 | 14 comments

By Steve Bennett, President and CEO, Symantec

Symantec’s strategy is clear: We want to enable people, businesses and countries to focus their energies and time on achieving their aspirations, instead of being consumed with how to keep their digital lives safe and protected.  This is a story about more focus and better execution by Symantec to make things better and easier for our customers and partners. Our path is straightforward: Offer better products and services tailor made for customers, and make it easier for them to research, shop, buy, use, and get the help and support they need.

There is a huge set of underserved and unmet needs that customers are experiencing with regards to protecting, moving and managing their information on multiple devices. ...

Digital Dave | 15 Jan 2013 | 0 comments

Businesses are adopting new technology at an unprecedented pace, and the cloud is one area where we’re making the most progress. And by now it’s clear that the cloud provides significant advantages to businesses, improving agility and reducing costs. But there is a darker side as well that organizations may overlook – hidden costs of cloud implementation that can negate the benefits if not properly contained.

The 2013 Symantec Avoiding the Hidden Costs of Cloud Survey reveals some of these unanticipated challenges businesses face as they look to take advantage of today’s efficient cloud solutions. The businesses surveyed showed that, compared to a year ago, cloud adoption is seeing significant progress. In fact, 90 percent of them are now at least discussing the cloud, an increase from 75 percent a year before. But at the same, cloud computing presents its own set of challenges, and industry experts anticipate that security issues and outages will...

khaley | 21 Dec 2012 | 2 comments

Are malware authors becoming more unpleasant? The amount of cyber-crime goes up year after year and 2013 will be no exception. Bad guys will continue to dream up new ways to rip people off.  Sure, we’ll be stolen from, spied on and threatened in 2013. None of this will be new. But there is a new trend that started in 2012 and seeming set to take off in 2013. I call it nastiness.

We didn’t call out this trend in our 2013 predictions. But if you look at those predictions you can see it. I can’t tell you why this is or why it started. This nastiness is happening in targeted attacks and in massive attacks. They are quite separate trends—done for quite different reasons and...