Video Screencast Help
Information Unleashed
Showing posts tagged with big data
Showing posts in English
ketan_shah | 14 Jul 2013 | 1 comment

data insight.jpgDark Data.

The term may sound ominous and mysterious, like something out of deep space. Analyst firm Gartner defines dark data as "the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes. Similar to dark matter in physics, dark data often comprises most organizations' universe of information assets."

Today we are announcing Symantec Data Insight 4.0 to help IT administrators take back control of dark data. Lack of insight into this information is due to the rapid growth of unstructured dark data, which is generally poorly managed and stored. Many data centers literally have petabytes of unstructured...

Symantec Corp. | 04 Dec 2012 | 0 comments

By Dan Lamorena, Director, Product Marketing, Storage and Availability Management Group

A couple of weeks ago, my colleague Kevin Haley posted the Top Five Security Predictions for 2013. Today we share with you the top storage predictions for 2013.

As we share them, we realize that we don’t have solutions that address all of the facets of these predictions, but it is what we see as major issues addressing the market in the coming year based on our experience and conversations with our customers and partners.

1. Hypervisor market share will dramatically change with greater diversity of virtualization solutions.

The market share of hypervisor vendors will begin to see major changes between the largest...

caroline wong | 12 Oct 2012 | 0 comments

When the words “big data” and “security” are used together in a sentence, usually the word “problem” or “concern” is in there too. Security is often thought of as a prohibitor to using big data, since data of all types – including confidential – are being mixed together to generate analytics which can be used for better decision making. But while there are concerns, big data can actually be harnessed to improve security.

The job of the defender is to protect against an infinite number of attacks. However, a defender will always have a limited amount of resources with which to do this. The real job of the security practitioner is to prioritize remediation efforts by risk, so that the limited resources can be focused on addressing the greatest risks to the business.

Most security organizations have anywhere between five and hundreds of different security technologies deployed in their enterprise environments....