Video Screencast Help
Information Unleashed
Showing posts tagged with General Symantec
Showing posts in English
khaley | 15 Apr 2013 | 0 comments

Targeted_Attacks_in2012_1280x394.jpgSome of us are numbers people.  We like nothing more than digging into a big batch of numbers.  I confess I’m the other type of person. I still fumble around a spreadsheet and can’t add without the aid of a calculator. For numbers people the ISTR is a terrific document. This year’s report is 160 pages of numbers that do a pretty good job of describing the threat landscape. If you’re a numbers person, feel free to dig in to the full report. You can also check out highlights in this graphic.

If you’re like me, and not really a numbers person, then read on. I’ve bullied my way through the numbers so you don’t have to. Let me give you the highlights, some of the interesting...

Cecily Joseph | 25 Feb 2013 | 0 comments

Education – particularly science, technology, engineering, and math education, as well as equal access to education around the globe – is a strong focus for Symantec. This is why we’ve announced more than $1 million in grant funding to education-focused initiatives today.

With these funds, we’ve started some new relationships with institutions focused on education, reflecting our growth in this space and our maturation as a global company, and strengthened our relationships with some long-standing partners with whom we’ve worked for many years. These latest grants give us an opportunity to more fully apply our resources in terms of employee time and talent, and to expand our reach into new geographic areas.

The...

FranRosch | 18 Feb 2013 | 0 comments

Successful technology adoption requires managing the drawbacks while maximizing the benefits, and few trends today illustrate this better than mobility. We’re seeing a wide variety in the degree to which organizations are allowing employees to use mobile devices for business, as well as the amount of control they are exerting over devices and applications. To see the results of these different philosophies and determine how organizations can get the most out of their mobile deployment, Symantec surveyed more than 3,000 organizations, from SMBs to large enterprises.

Innovators and Traditionals

We asked the businesses about their level of involvement with mobility, and noted two distinct groups among the...

RobertHamilton | 06 Feb 2013 | 0 comments

fren·e·my [fren-uh-mee] noun. Someone who is both friend and enemy, a relationship that is both mutually beneficial or dependent while being competitive, fraught with risk.

When it comes to taking your intellectual property (IP), employees are the less obvious player but they can be frenemy #1. In many cases, these trusted employees are moving, sharing and exposing sensitive data in order to do their daily jobs. In other instances, they are deliberately taking confidential information to use at their next employer. It’s not that these employees are inherently malicious – often they just don’t know it is wrong to do so.

According to a new Symantec survey...

Symantec Corp. | 31 Jan 2013 | 8 comments

 

As a follow-up to a story run by the New York Times on Wednesday, Jan. 30, 2013 announcing they had been the target of a cyber attack, Symantec (NASDAQ: SYMC) developed the following statement:
 
"Advanced attacks like the ones the New York Times described in the following article, (http://nyti.ms/TZtr5z), underscore how important it is for companies, countries and consumers to make sure they are using the full capability of security solutions. The advanced capabilities in our endpoint offerings, including our unique reputation-based technology and behavior-based blocking, specifically target sophisticated attacks. Turning on only the signature-based anti-virus components of endpoint solutions alone are not enough in a world that is changing daily from attacks and threats. We encourage customers to be very aggressive in deploying solutions that offer a...
Symantec Corp. | 23 Jan 2013 | 14 comments

By Steve Bennett, President and CEO, Symantec

Symantec’s strategy is clear: We want to enable people, businesses and countries to focus their energies and time on achieving their aspirations, instead of being consumed with how to keep their digital lives safe and protected.  This is a story about more focus and better execution by Symantec to make things better and easier for our customers and partners. Our path is straightforward: Offer better products and services tailor made for customers, and make it easier for them to research, shop, buy, use, and get the help and support they need.

There is a huge set of underserved and unmet needs that customers are experiencing with regards to protecting, moving and managing their information on multiple devices. ...

Digital Dave | 15 Jan 2013 | 0 comments

Businesses are adopting new technology at an unprecedented pace, and the cloud is one area where we’re making the most progress. And by now it’s clear that the cloud provides significant advantages to businesses, improving agility and reducing costs. But there is a darker side as well that organizations may overlook – hidden costs of cloud implementation that can negate the benefits if not properly contained.

The 2013 Symantec Avoiding the Hidden Costs of Cloud Survey reveals some of these unanticipated challenges businesses face as they look to take advantage of today’s efficient cloud solutions. The businesses surveyed showed that, compared to a year ago, cloud adoption is seeing significant progress. In fact, 90 percent of them are now at least discussing the cloud, an increase from 75 percent a year before. But at the same, cloud computing presents its own set of challenges, and industry experts anticipate that security issues and outages will...

MatthewEllard | 09 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part twoPart four.

In our series of blogs about the value of ideas and IP, we have covered the vital need to protect information and also the instances when protection is not appropriate – either because it hampers business processes or because the data has become old and therefore worthless.

What has become clear is that not all information is equal in value. Some is of very high value while other data can actually represent a cost to a business – either because it has to be stored and protected...

MatthewEllard | 04 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part three, Part four.

In my last post discussing the value of an idea, it was argued that more attention needs to paid to understanding the value of intangible assets – information saved as digital records. A retailer wouldn’t leave its stock in an unlocked warehouse so why would – for example – an industrial designer leave plans and client details open to competitors via an unsecured USB drive or unencrypted email message?

While there are some simple...

Symantec Corp. | 04 Dec 2012 | 0 comments

By Dan Lamorena, Director, Product Marketing, Storage and Availability Management Group

A couple of weeks ago, my colleague Kevin Haley posted the Top Five Security Predictions for 2013. Today we share with you the top storage predictions for 2013.

As we share them, we realize that we don’t have solutions that address all of the facets of these predictions, but it is what we see as major issues addressing the market in the coming year based on our experience and conversations with our customers and partners.

1. Hypervisor market share will dramatically change with greater diversity of virtualization solutions.

The market share of hypervisor vendors will begin to see major changes between the largest...