Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Inside Symantec Community Blog
Showing posts tagged with public sector
Showing posts in English
tiffany_jones | 06 Aug 2012 | 0 comments

Recently, public sector cloud adoption took another leap forward as the Department of Defense released its four-step strategy for the phased implementation of a DOD Enterprise Cloud Environment.

Having studied the plan, we can attest to the critical importance of the effort. The anticipated gains in cost efficiency (moving from a CapEx model to an OpEx model), operational efficiency, and resource optimization will be felt -- as DOD Chief Information Officer Teri Takai puts it -- “from the continental United States to the warfighter at the tactical edge.”

However, we should note that this is just the first step.

Data center consolidation, as positioned in the DOD plan, will be the major catalyst for driving the DOD cloud environment forward and provide the foundation for further cloud-based innovations that could have an even greater direct impact on the American warfighter.

For instance, DOD’s shared services model – made possible...

Jen Nowell | 15 Dec 2011 | 0 comments

Arriving again on New York Ave. 1100 NW to be exact.  I love this city.  In Washington old man winter has arrived. 


The topic of the day is Cybersecurity legislation and privacy.  This is a touchy subject for all because it is a very delicate balance of our constitutional rights as US citizens and the very freedom our troops fight for on the battlefields to ensure the security and livelihood of the land of the free.


Those of us who have been without power for more than 3 days or had the Verizon recording repeating “all circuits are busy” when you are trying to communicate with someone you love in a crisis or sitting in the HOV lanes dead stop and all lanes are blocked.  The feeling of no control is a constant reminder of how fortunate we are…everyday. 



tiffany_jones | 20 Jul 2011 | 1 comment

Tiffany Jones, director, Public Sector Programs and Strategy

As one might expect, details are scarce in the declassified version of the DoD’s first-ever cyberspace guidelines (released last Thursday). But from a 30,000 foot perspective, the policy looks sounds.

Consider the five key tenets (or “strategic initiatives”) contained in the directive:

1: Treat cyberspace as a domain for training and equipping defense forces

2: Employ new defense operating concepts

3: Create strong partnerships between agencies and with the private sector

4: Build relationships with foreign allies

5: Leverage U.S. innovation

These are worthy goals, to be sure (in particular, the overarching themes of operational preparedness and information sharing). Even without the details, it’s heartening to see fundamentally sound priorities for a DoD infrastructure that houses—quite possibly—more sensitive information...

CrisPaden | 13 Jun 2011 | 0 comments

Cris Paden, communications manager, Symantec Public Sector organization

Gigi Schumm will post a few of her thoughts after the event, but this year marks the sixth year of Government Symposium and it is the largest event so far.  It’s not surprising given the recent rash of high profile cyber security incidents, whether it’s the data breaches at Sony, Epsilon, the IMF; or the spearphishing attacks on RSA’s Secure ID devices and on targeted Gmail accounts of users.  Government agencies also find themselves in a tremendous period of change.  Last year we barely talked about cloud adoption or the proliferation of mobile devices.  Here we are a year later, and we face a completely different work landscape because of those two issues.  In addition to all of this, we are honored to have Gen. Colin Powell provide the morning keynote at our event, and Rand Beers of DHS provide the luncheon keynote.  I have attended and worked at all...

JBordwine | 13 Jun 2011 | 0 comments

John Bordwine, chief technology officer, Symantec Public Sector organization

What you’re seeing with the latest rash of cyber security incidents is a point we’ve been trying to emphasize for some time now:  With regards to protecting information, the emphasis should be on securing the information and not the devices or the infrastructure.  In addition, more folks are starting to use devices of their own choice to do their job, whether they may or may not be sanctioned by an agency’s IT department.  When you throw in growing use of the cloud and how folks are taking advantage of social networking groups and social media communication for work purposes, it makes focusing on the device even more obsolete.  As such, in my opinion, you’re going to see IT departments become more responsible for managing information, and also developing new policies and practices around the expanding infrastructure.  It used to be when you needed a...

gschumm | 13 Jun 2011 | 0 comments

Gigi Schumm, vice president and general manager, Symantec Public Sector organization

There’s been a glut of incidents lately that have brought cyber security issues to the forefront.  The data breaches at Sony and Epsilon, the hacking of Gmail accounts, and the security vulnerabilities with RSA Secure ID tokens.  We’ve certainly gotten a lot of questions about how government agencies and individuals can protect themselves from these types of incidents.  The short answer is, there’s no technological, one-size-fits all technological silver bullet, and there never has been.  I’ve been in the cyber security business for 14 years and have witnessed the evolution of cyber attacks.  First it was large scale viruses and denial of service attacks, then it was Trojans, now it’s extremely targeted attacks looking for specific information.  And while the attacks have changed, the answer to securing information continues to be...