Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts tagged with endpoint protection
Showing posts in English
piero_depaoli | 16 May 2014 | 0 comments

With our constant internet usage and plethora of devices, there is more information being generated and shared online than ever before. As a result, the focus of cybercriminals has shifted and antivirus is no longer enough to protect against their sophisticated attacks. Symantec led the first era of security with antivirus, and it continues to be an important part of our portfolio, but the internet security landscape has changed a lot since then, and you must implement more than antivirus to meet the challenges of today’s threats.

AV software, which is used to prevent, detect and remove or disarm malicious computer programs and malware threats, is not sufficient protection on its own because it only protects against the bad software that we already know exists. Essentially, antivirus is only a reactive technology. We have to know about a threat to write a detection for it. So, although AV does a good job of catching new variants of existing threats, it doesn't catch...

MatthewEllard | 12 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part two, Part three.

To conclude our series of blogs on the value of information and IP, we’re going to look at the ways in which information and IP – which has become so valuable to businesses – can be protected.

As the flow of information has shifted beyond the data centre, information management is more important than ever. To minimise information sprawl and its effects on the organisation, businesses can follow a few simple steps:

  • Focus on the information, not the device...
MatthewEllard | 09 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part twoPart four.

In our series of blogs about the value of ideas and IP, we have covered the vital need to protect information and also the instances when protection is not appropriate – either because it hampers business processes or because the data has become old and therefore worthless.

What has become clear is that not all information is equal in value. Some is of very high value while other data can actually represent a cost to a business – either because it has to be stored and protected...

MatthewEllard | 04 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part one, Part three, Part four.

In my last post discussing the value of an idea, it was argued that more attention needs to paid to understanding the value of intangible assets – information saved as digital records. A retailer wouldn’t leave its stock in an unlocked warehouse so why would – for example – an industrial designer leave plans and client details open to competitors via an unsecured USB drive or unencrypted email message?

While there are some simple...

MatthewEllard | 02 Dec 2012 | 0 comments

This is part of a four-part series on intellectual property. Other posts in the series may be found at Part two, Part three, Part four.

We live in a knowledge-based economy – where ideas are money. In fact, according to the Intellectual Property Office, the UK design industry alone is worth over £15bn a year to the nation’s coffers.

As a result, it has never been more vital for industry and individuals to protect the fruits of their intellectual labour. This includes customer information, financial or legal records, designs, written articles and records, or any number of other different types of explicit, recorded...

tzambrovitz | 27 Aug 2012 | 0 comments

With IT budgets that are shrinking or barely holding steady, it’s vital for today’s businesses to make the most of their current infrastructure. Fortunately, however, leveraging virtual infrastructure to enable cloud computing is possible without having to rip and replace the entire infrastructure. Whether an organization is replacing legacy technologies or adapting them to virtualization, Symantec and VMware have teamed up to help businesses make the transition to virtualization as smoothly as possible – with approximately 100 points of integration to date.

This integration effort goes beyond simply enabling the technologies to work together, to the IT users themselves. We have developed various integration levels ranging from...

Tim_Matthews | 15 May 2012 | 0 comments

U.S. companies are paying more to notify people impacted by data breaches, according to the 2011 Cost of a Data Breach Study: United States. The average cost to notify victims of breach increased in this year’s study from approximately $510,000 to $560,000. At the same time, the average size of a breach is down 16 percent and the costs associated with the detection and escalation of data breach events declined as well, suggesting that companies may be more efficient in investigating data breaches.

So, if companies are better at detecting breaches and breaches involve fewer records, why are notification costs continuing to creep up?

The...

Sean Doherty | 01 Mar 2012 | 1 comment

It’s no secret that information is the prize in today’s war between businesses and cybercriminals. And just when organizations had come to terms with the fortress-style protection needed to keep information safe within the corporate walls, technology evolved to include virtualization and cloud. These advances provide increased business flexibility, improved scalability and can create significant cost savings, but they also increase your exposure to outside threats and therefore drive up risk. And, as if to make matters worse your InfoSec team has to figure out how to keep corporate data safe when it is being accessed out of the office on mobile devices, as well as ensuring the security of the virtualized data center which is highly dynamic in nature.

Symantec is teaming up with the leading virtualization provider VMware, to address some of the most pressing security issues affecting businesses globally as they take the step to virtualize more business critical...