Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Inside Symantec Community Blog
Showing posts in English
Rich Lam | 19 Jun 2011 | 1 comment

About a week ago, we added new interactivity to the third banner on the GeoTrust homepage (Now part of Symantec). Upon clicking on the projector graphic, visitors are presented with a modal overlay featuring an embedded video on how more Alexa top 1 million domains are using GeoTrust. It's an infotaining and engaging video. Enjoy!

Gina Sheibley | 17 Jun 2011 | 0 comments

After recent hits to major cloud services, the cloud has been compared to airplanes. The idea is that you’re safer in a plane than a car, but when it goes down it will go down spectacularly, and the impact will be more widespread. However, you can’t approach cloud like you would buying an airline ticket—where cheapest fare takes priority.

In a blog post on CIO.com Blogs and Discussions, my colleauge Dave Elliott, argues that the move to the cloud is more like a car. Before making your decision, you research the reliability and safety features of different models; you investigate safety; and you check out what others have said. Dave provides six tips on how to approach cloud including: look under the hood, consider your precious cargo and take it for a test drive. Read more.

Kevin | 17 Jun 2011 | 18 comments

Hi all,

I wanted to thank you for this feedback (adding a new "Recent Activity" sort order to forum lists) and let you know we're going to roll this new sort option out to the production server this evening.

Cautionary note: To make this work, we're having to re-index the site (which takes several hours). During that time, the sort order will, indeed, be out of whack.

We hope to have the indexing completed at the latest by Sunday afternoon and at the earliest by Saturday morning (PST).

Thanks again for your support.
Kevin

CrisPaden | 13 Jun 2011 | 0 comments

Cris Paden, communications manager, Symantec Public Sector organization

Gigi Schumm will post a few of her thoughts after the event, but this year marks the sixth year of Government Symposium and it is the largest event so far.  It’s not surprising given the recent rash of high profile cyber security incidents, whether it’s the data breaches at Sony, Epsilon, the IMF; or the spearphishing attacks on RSA’s Secure ID devices and on targeted Gmail accounts of users.  Government agencies also find themselves in a tremendous period of change.  Last year we barely talked about cloud adoption or the proliferation of mobile devices.  Here we are a year later, and we face a completely different work landscape because of those two issues.  In addition to all of this, we are honored to have Gen. Colin Powell provide the morning keynote at our event, and Rand Beers of DHS provide the luncheon keynote.  I have attended and worked at all...

JBordwine | 13 Jun 2011 | 0 comments

John Bordwine, chief technology officer, Symantec Public Sector organization

What you’re seeing with the latest rash of cyber security incidents is a point we’ve been trying to emphasize for some time now:  With regards to protecting information, the emphasis should be on securing the information and not the devices or the infrastructure.  In addition, more folks are starting to use devices of their own choice to do their job, whether they may or may not be sanctioned by an agency’s IT department.  When you throw in growing use of the cloud and how folks are taking advantage of social networking groups and social media communication for work purposes, it makes focusing on the device even more obsolete.  As such, in my opinion, you’re going to see IT departments become more responsible for managing information, and also developing new policies and practices around the expanding infrastructure.  It used to be when you needed a...

gschumm | 13 Jun 2011 | 0 comments

Gigi Schumm, vice president and general manager, Symantec Public Sector organization

There’s been a glut of incidents lately that have brought cyber security issues to the forefront.  The data breaches at Sony and Epsilon, the hacking of Gmail accounts, and the security vulnerabilities with RSA Secure ID tokens.  We’ve certainly gotten a lot of questions about how government agencies and individuals can protect themselves from these types of incidents.  The short answer is, there’s no technological, one-size-fits all technological silver bullet, and there never has been.  I’ve been in the cyber security business for 14 years and have witnessed the evolution of cyber attacks.  First it was large scale viruses and denial of service attacks, then it was Trojans, now it’s extremely targeted attacks looking for specific information.  And while the attacks have changed, the answer to securing information continues to be...

Kimberley | 02 Jun 2011 | 1 comment

Symantec will be conducting a research study in June to gather feedback from Connect users who have also shopped in our online Business stores. The purpose of the research is to collect important, time-sensitive feedback, and by participating, you’ll allow Symantec to better meet your needs. 

Study method:

The research will be conducted via phone. Specifically, participants will provide their feedback via a 45-minute phone discussion. During the call, the moderator will share materials through a webcast for study participants to evaluate. Everyone who participates in the study will be paid for their time.

How to participate:

Symantec has commissioned Mozaic Group, an independent research firm, to conduct the interviews.

If you are interested in participating, please reply-to connect_study@mozaic-group.com  with your name and...

Johny99 | 04 Apr 2011 | 1 comment

Hi,

I am have changed the content of a sysprep.inf file in ghost explorere. But when I want to change it back the content is deleted and only a few texts remain.

I went further and deleted the file and pasted another one but, when I paste the new file the content of the new file changes again.

Any idea?

CTO Mark Bregman | 01 Apr 2011 | 1 comment

I read Simon Crosby’s post on mashable.com (http://mashable.com/2011/03/29/cloud-computing-security/) with great interest.  Simon always has interesting things to say but I don’t always agree with him.  In this case I agree that moving to the cloud can enhance the protection of one’s data but it is by no means a forgone conclusion. 

Putting data in the cloud requires putting one’s trust in the cloud provider.  Sophisticated cloud providers who focus on protecting their customers’ assets can indeed provide better security than most enterprises can provide themselves.  On the other hand, moving to the cloud can create governance problems.  Many companies find that they use multiple cloud providers, each with their own policies and procedures.   How is a CIO,  CISO or even a small business owner supposed to...

| 31 Mar 2011 | 1 comment

Symantec wants to hear from you!  Do you influence or own any decisions around enabling, securing, or managing mobile devices like iPhones, iPads, Androids, or other mobile devices?  Do you influence or own decisions about developing or deploying applications for mobile devices? If so, we’d like to talk with you about your experiences. This is a quick process (as little as 30 minutes), and for your valuable input, you’ll be entered into an exclusive raffle to win a 16 GB Wi-Fi enabled Apple iPad!

To participate, simply send me an email describing your role with regard to mobile devices in your organization.  We’ll schedule a short call at a time convenient for you. This call will not be a sales call by any means, but rather an opportunity for you to share your insights and challenges around enabling mobile devices in...