Video Screencast Help
Information Unleashed
Showing posts tagged with BYOD
Showing posts in English
John_Brigden | 27 Nov 2012 | 0 comments

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the...

Patricia Titus | 30 Aug 2012 | 0 comments

For many people, owning a dog can be a truly rewarding experience. But it takes careful preparation and hard work for that unruly puppy to grow up into an obedient, faithful companion – without training and discipline, you might end up with chewed-up sneakers and frightened neighbors. And while the corporate data center seems a world away from a backyard kennel, many of the same principles apply when you are bringing new technology into the workplace – the amount of preparation you do will largely determine your success. Of particular concern these days is the growing desire of employees to use their own mobile devices for work. This BYOD (bring your own device) trend is causing concern among IT administrators and senior management alike. But with adequate preparation and management...

John_Brigden | 07 Jun 2012 | 0 comments

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications...

bduckering | 17 May 2012 | 0 comments

In October of 2010, Symantec publicly announced its mobile protection strategy, defining a new era in how Symantec secures and manages the information and identities of consumers, businesses and governments in an increasingly mobile world. At its core, the announcement laid out our protection strategy and approach for enterprises, consumers and communication service providers.

That approach is still at the core of how Symantec is addressing the larger mobility trend. However, we continue to strengthen and refine our approach as advancements in mobility develop and changes to the mobile threat landscape evolve. In that regard, Symantec announced some significant advancements to its overall mobile strategy in February of this year and demonstrated that we have delivered on our mobile strategy. Some of those advancements hinged on the acquisition of Odyssey Software.

Odyssey...