Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Information Unleashed
Showing posts tagged with Security
Showing posts in English
Solange Deschatres | 16 Jun 2014 | 0 comments

Although 2011 was first hailed the “Year of the Data Breach,” it appears that was only the beginning. Last year was truly an exceptional year for data breaches, with more data records lost and stolen than ever before. While cyber-espionage and threats to privacy grabbed the headlines, by the end of the year we were faced with the reality that cybercrime remains the most prevalent and a real security threat to businesses. Huge data heists on companies like Target, LivingSocial and AOL, impacted brand reputations, consumer trust and ultimately the bottom line.

In Symantec’s latest Internet Security Threat Report (ISTR), we found the number of data breaches grew 62 percent from 2012, translating to more than 552 million identities exposed last year – an increase of 368 percent. This was also the first year that the top eight data breaches each resulted in the loss of tens of millions of...

Manny_Kostas | 23 Apr 2014 | 0 comments

Ubiquity, freedom, possibility: what it means to protect information.

When information is safe, that’s when the possibilities of that information are unleashed.

At Symantec, we are in a unique position to enable businesses to create, build, and succeed.

More than merely keeping attackers at bay, Symantec allows information to be used, shared, and created free from the kinds of worry and apprehension that stifle innovation.

Our understanding of the threat landscape necessitates a new conversation about holistic information protection. This is the conversation we started with our new “Do It All” video, and one we hope to continue throughout the coming months. We encourage you to continue telling us your experiences, goals, and thoughts about information protection. After all, this is a conversation and not a monologue, and the greatest human enterprises are only possible...

Symantec Corp. | 26 Mar 2013 | 0 comments

 

By Joe Bertnick, Director of Product Management, Symantec Corp.

On the battlefield, a general’s responsibility is to coordinate different bodies of soldiers whose commanders may not know what the others are doing. The complete picture of the battle only emerges when these individual reports can be combined and analyzed, yielding a strategy to ensure victory. Just as modern war has come to involve smaller bodies of soldiers carrying out specific missions, our security tools in the data center are addressing new and unique risks to different parts of the security ecosystem. In this world, the CISO is the general directing our overall efforts, merging the “in the trenches” technical details with the overall strategic direction of the business. And they need to be able to gather this intelligence anywhere, at any time, because security incidents aren’t limited to office hours. And...

Symantec Corp. | 12 Dec 2012 | 0 comments

By Brian Burch, Vice President of Americas Marketing for SMB at Symantec

Most people agree that small- to medium-sized businesses (SMBs) are a significant source of the innovation that fuels growth, but a lesser recognized fact is the critical role of start-ups in economic recovery. A new report from the Kauffman Foundation indicates that the pace of recovery in hiring and job creation since 2008 is stronger in newer firms – 4 out of every 10 hires at young firms are for newly created jobs.

Supporting small businesses, established and new, in their development and growth is germane to the economy. A major part of small businesses’ success now and in the future will increasingly derive from their business relationships with large corporations. More...

John_Brigden | 27 Nov 2012 | 0 comments

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the...

John_Brigden | 01 Oct 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up...

tzambrovitz | 27 Aug 2012 | 0 comments

With IT budgets that are shrinking or barely holding steady, it’s vital for today’s businesses to make the most of their current infrastructure. Fortunately, however, leveraging virtual infrastructure to enable cloud computing is possible without having to rip and replace the entire infrastructure. Whether an organization is replacing legacy technologies or adapting them to virtualization, Symantec and VMware have teamed up to help businesses make the transition to virtualization as smoothly as possible – with approximately 100 points of integration to date.

This integration effort goes beyond simply enabling the technologies to work together, to the IT users themselves. We have developed various integration levels ranging from...

Guido Sanchidrian | 24 May 2012 | 2 comments

The last few days I spent some time to digest the latest Symantec Internet Security Threat Report Volume 17. This comprehensive report provides an overview and analysis of the year 2011 in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.

I am an active member of the Cloud Security Alliance Mobile Working Group, where we actually do research on secure mobile endpoint computing, which will result into valuable guidelines to be published this year. Therefore my Threat Report reading was likely shorten through the lens of...

Steve Cullen | 18 May 2012 | 0 comments

One of the great challenges businesses face today is enabling productivity by giving people access to the resources they need, without compromising the safety of that information. And while it’s not always easy to see the risks, recent events have made it obvious that disaster can strike at any time, in many different ways. It’s vital for organizations of all sizes to have a plan in place to keep their business operational when things go wrong.

Complicating the situation are several megatrends that are having a significant impact on IT today: namely, virtualization, cloud and mobility. These technologies are giving even small businesses the flexibility they need to compete better in a global market, but how are they affecting our ability to...

Patricia Titus | 17 Apr 2012 | 0 comments

People have the curious ability to get used to almost anything over time. Whether it’s learning to fall asleep to traffic noise or coming to accept wrinkles as we age, we often become comfortable with our situation.

While this adaptability can be a good thing, sometimes it leads to complacency. In the constant fight against cybercrime, for example, becoming comfortable is the last thing people should do. In their quest to steal information, cybercriminals are constantly changing their methods, just like how a human virus evolves in the real world. To keep information safe, we are continuing to evolve new defenses against these attacks. But with so many threats out there – where do you start? Well, don’t try to boil the ocean!

One of the biggest mistakes we see is when organizations secure the endpoint and really lose focus on what really matters, the data! Security means more than protecting your smartphone, laptop or PC. It’s also about the...