Video Screencast Help
IT Industry Trends
Showing posts tagged with General Symantec
Showing posts in English
Dianed | 18 Jan 2013 | 1 comment

Introduction

Mobile is going mad—growing exponentially and absorbing more and more of our everyday business and personal lives. We therefore posed some thought-provoking topics to Symantec experts and influencers in the mobile field, gathering expert opinions on topics like the Consumerisation of IT, and what impact the influx of consumer technology will have on business. 

Join the conversation below. We are eager to discover your thoughts, your experiences, and your vision.

What will the future working week look like?

When 3G technology burst into mainstream mobile telecommunications, we all though office life would be getting an obituary. A...

NickWood | 04 Oct 2013 | 0 comments

Software defined storage (SDS) is a term that seems to have spread like wildfire in the last few months. But what actually is it and what are the benefits of it? In this post, I share my thoughts based on current research and conversations with peers.

SDS feels very much feels like a marketing term at the moment - used by vendors to capture mindshare and attachment to the broader topic of software-defined datacentre - a term popularized by VMware last year. For further reading on software-defined datacentre implementations, please review the following VMware case study that features Symantec’s recent internal transformation.

SDS, rather than being an actual product, is really an architectural outcome for next generation storage designs. Founded on storage virtualization, SDS uses abstraction to pool storage from commodity hardware to provide flexible,...

NickWood | 10 Mar 2013 | 0 comments

Data growth remains one of the most common topics of conversation I have with organisations. Pick any research study, and it will show you that data growth is relentless—more than 40 percent per annum most argue—and that pace of growth shows no sign of stopping. The largest growth area is in unstructured data: the data that resides outside structured databases.

The rapid adoption of mobile and cloud service’s extends where information resides beyond the traditional data centre boundaries. This creates new challenges around the management and protection of an organisation’s information.

From my conversation organisations are no longer solely focused on how to tame this growth. Techniques like de-duplication, space-optimised snapshots, compression and archiving are all essential tools and commonly used to better manage this growth. Now, the conversation is turning to other related matters, such as how to get better control and leverage of...

NickWood | 12 Dec 2012 | 0 comments

In my previous blog I outlined the topic of IT service assurance and the five key things to consider if you are looking to transform your IT department or simply operate it more efficiently with existing assets.

In this blog I will focus on the topic of IT continuity.

With hurricane Sandy recently tearing through the North East of the United States, businesses have been reaching once again for their business continuity plans (BCP). The broad topic of business continuity management (BCM) covers all facets of how to minimise risks and ensure continual delivery of business services, IT being one of the key elements.

Given the devastation a hurricane and other natural disaster can cause shouldn’t all businesses build BCM plans to accommodate these situations? Well yes, in the ideal world businesses would minimise or remove all risks - if money was no object. However, in reality budgets are limited and there’s often a reticence to sure up defences for...

petergrimmond | 07 Nov 2012 | 0 comments

In my previous blog, I outlined how unmanaged information growth is becoming unacceptable for enterprises.  The risks and costs associated with the growth and proliferation of unstructured data are becoming too great.  And businesses are failing to exploit the value of information assets effectively.

So, given the sheer volume of information involved, how should an enterprise embark on an Information Governance programme? 

Step 1: Reduce data loss from the enterprise perimeter

For many organisations, the greatest information governance fear is that critical information will leak out into hostile hands.  The consequences of data loss can be catastrophic: Symantec and Ponemon Institute’s report on the Cost of a Data Breach puts the average cost to an enterprise at £1.75m in the UK and $5.5m in the US.

Given these potentially...

petergrimmond | 02 Nov 2012 | 0 comments

For many enterprises, managing the growing volumes of data is becoming a major challenge.  Data centre storage volumes continue to grow in excess of 40% per annum.  And this is only the tip of the iceberg: ever more enterprise data is now found not only outside of the datacentre, but outside of the physical boundaries of the enterprise - on laptops, tablets and smartphones - as well as in the Cloud.

Many enterprises now consider unmanaged data growth to be simply unacceptable.  This is evident from the number that are embarking on Information Governance projects.  According to the recent Symantec 2012 State of the Data Center Survey, over 90% of organisations are either actively discussing information governance or have implemented trials or actual governance programs.  In addition, about one-third have already implemented information governance solutions.

But what is driving this focus on information governance?  From my discussions with...

NickWood | 28 Sep 2012 | 0 comments

As I meet with customers and partners and keep abreast of IT related news in the media, I see a number of commonly repeated business and IT related challenges - cost containment (reduce CAPEX or move it to OPEX), improved IT agility and better alignment with the business, enhanced information security and governance requirements, and how to meet increased resilience objectives.

Many of these are fairly well known challenges and no single solution appears to exist that address them all. The cloud conversation tends to come up pretty quickly as one of the “ways forward”. In this short l blog I will share with you my thoughts on other ways I see businesses reviewing and implementing strategies to transform their IT delivery platform.

Commoditisation: as components and services become less easy to distinguish between they become commoditised. To an extent we’ve seen with ERP/CRM systems, where previously huge expense in hardware and...

Guido Sanchidrian | 08 Aug 2012 | 0 comments

"Big Data" is one of the new buzzwords in IT. So it was just a question of time when "Big Data" hits the Information Security arena. Last week I saw a press release from Information Security Forum (ISF) - a very well established non-profit association of leading organisations from around the world. Their latest report shows how "Big Data analytics can improve information security and increase cyber resilience".

For sure "Big Data" analytics have become a standard practice in many aspects of business. Data warehousing, Business Intelligence, visualisation and a variety of sophisticated analyses are commonplace.

In their press release ISF say that "...the insights they [sophisticated analyses] can provide are not yet being widely realised in information security".

Really?

My initial thought whilst reading the press...

Guido Sanchidrian | 26 Jul 2012 | 0 comments

Today I found a small article in my daily RSS feeds titled "Miracle Battery-Saver App Harvests Email Addresses for Spamming". The article is a brief analysis of a malicious application that tricks the user by pretending to do something great for saving his/her mobile phone battery life.
It immediately raised a foundational question in my mind: Why do people still trust those type of miracle offers, even clicking on "allow" to the application's permission request to read the user's contacts data (in order to acquire the personal data) and the second permission asks to access the Internet (in order to upload the personal data)?

Theoretically, Spam and its associated malicious code should be extinct already, because every computer user should be aware more or less that this bad stuff exist, and should be suspicious...

Guido Sanchidrian | 04 Jul 2012 | 0 comments

The role of the board of directors in Enterprise Risk Management (ERM) is changing significantly and becomes increasingly challenging due to major trends like cloud migration or big data, as well as initiative in mobile computing such as Bring-Your-Own-Devices (BYOD).

The board of directors and senior management have to re-think periodically their ERM approaches, concepts, techniques and tools to meet new business objectives and to achieve processes enhancements.

Adopting a structured approach to ERM by using industry best practices such as COBIT, COSO, ISO 31000, ITSM/ITIL, etc. provides a vital instrument to develop a common language that builds a "community of purpose" between operations and strategic business, and facilitates the discussion across the organisation.

Cloud computing in particular impacts the full bandwidth of financial risks, infrastructure risks, market risks as well as reputational risks. In the latest paper published by the...