Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed
Showing posts tagged with Mobile
Showing posts in English
FranRosch | 18 Feb 2013 | 0 comments

Successful technology adoption requires managing the drawbacks while maximizing the benefits, and few trends today illustrate this better than mobility. We’re seeing a wide variety in the degree to which organizations are allowing employees to use mobile devices for business, as well as the amount of control they are exerting over devices and applications. To see the results of these different philosophies and determine how organizations can get the most out of their mobile deployment, Symantec surveyed more than 3,000 organizations, from SMBs to large enterprises.

Innovators and Traditionals

We asked the businesses about their level of involvement with mobility, and noted two distinct groups among the...

John_Brigden | 27 Nov 2012 | 0 comments

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the...

khaley | 08 Nov 2012 | 0 comments

With this year quickly coming to an end, it’s time for us at Symantec to publish our predictions on what we expect will happen in the world of cybersecurity for the coming year.

Most of us at Symantec tend to be fact-based, data-driven individuals. However, predicting the future always involves a bit of speculation. To derive our predictions for 2013, we began by talking to hundreds of security experts at Symantec to gather their thoughts and ideas. Then, we peer-reviewed these ideas, argued a lot, and boiled it all down to a handful of predictions that we felt would provide real insight into where we believe the threat landscape is going.

While these predictions are based on what we see today, they also reflect where we think things are going based on our years of...

Marian Merritt | 05 Sep 2012 | 0 comments

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects- and increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under ½ of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.

The nature of the crimes is shifting towards the social networks we love and the mobile devices we use constantly. Consumers seem to...

John_Brigden | 07 Jun 2012 | 0 comments

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications...

khaley | 29 Apr 2012 | 0 comments

When it comes to Internet security, organizations shouldn’t feel like it’s only a matter of time before they suffer a catastrophe. But at the same time, it’s important to recognize that there is no single preventive measure that will guarantee safety from all attacks. Unfortunately, there are so many kinds of attacks that it’s difficult for users to know what threats are the most dangerous, and how to stay on top of them, but each can be dealt with individually. Each year Symantec publishes the Internet Security Threat Report to provide users with a better understanding of the threat landscape, and in a sense helps provide an alliance to protect them from being blindsided.

Symantec’s 2011 Internet Security Threat Report reveals that threats are skyrocketing and are...

CJ Desai | 30 Mar 2012 | 0 comments

 

When it comes to protecting your IT resources, endpoint security is a no-brainer. Employing basic protection such as antivirus software has been an integral part of security for so long that endpoint protection seems like one of the few constants in technology.

Except, it isn’t.

Two big trends are changing the way endpoint security is handled. First, the very definition of endpoints is changing. Once the term just meant desktop computers and servers, but it now also encompasses mobile devices such as laptops, smartphones and tablets, as well as virtual servers and desktops – any place corporate data can be accessed. And that data is being stored in more and more places. Gone are the days of a single, fortress-like IT infrastructure protecting all your information...

Gina Sheibley | 09 Jan 2012 | 2 comments

 

In 2011, corporate information emerged as the most coveted asset in the cybercrime war, the vast amount of digital information in the world grew even more rapidly and the surge in mobile devices in the workplace added another layer of complexity for IT executives.

So what's next?  I sat down with Francis deSouza, Symantec's Group President of Enterprise Products and Services, to get a sense of the challenges CIOs will face in their quest to keep their information secure and accessible in 2012.  Following is a recap of our discussion including a few key predictions to consider as you plan for the year ahead: 

Question 1:Francis, you spend a lot of time with our customers.  What challenges do they face in the year ahead?

Francis deSouza: As...