Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
IT Industry Trends
Showing posts tagged with Mobile
Showing posts in English
Dianed | 18 Jan 2013 | 1 comment


Mobile is going mad—growing exponentially and absorbing more and more of our everyday business and personal lives. We therefore posed some thought-provoking topics to Symantec experts and influencers in the mobile field, gathering expert opinions on topics like the Consumerisation of IT, and what impact the influx of consumer technology will have on business. 

Join the conversation below. We are eager to discover your thoughts, your experiences, and your vision.

What will the future working week look like?

When 3G technology burst into mainstream mobile telecommunications, we all though office life would be getting an obituary. A...

Swarna | 04 Nov 2012 | 0 comments


A trip of firsts - that's what it was for me. First time for Gartner Symposium, first time to Orlando, first show where I led the mobile discussions and first Gartner show at which I presented - even if it was just a 20min theater presentation on the show floor. What a memorable and exciting learning experience for me! As I headed home, I took the learning, introductions, musings and experiences with me.

Most of my conversations at the Symposium were with our customers who swung by the Symantec booth to say hello or with those who have heard about/been told to go to Symantec to hear and see our mobile products in action.

"I have all these users that want to bring their iPads/iPhones and ask me to give them corporate access on those devices. Sometimes it is just email, but sometimes it is more than that. How can I do that and still know my corporate information is secure?"

"I don't want to manage all those mobile devices...

NickWood | 27 Sep 2012 | 0 comments

As I meet with customers and partners and keep abreast of IT related news in the media, I see a number of commonly repeated business and IT related challenges - cost containment (reduce CAPEX or move it to OPEX), improved IT agility and better alignment with the business, enhanced information security and governance requirements, and how to meet increased resilience objectives.

Many of these are fairly well known challenges and no single solution appears to exist that address them all. The cloud conversation tends to come up pretty quickly as one of the “ways forward”. In this short l blog I will share with you my thoughts on other ways I see businesses reviewing and implementing strategies to transform their IT delivery platform.

Commoditisation: as components and services become less easy to distinguish between they become commoditised. To an extent we’ve seen with ERP/CRM systems, where previously huge expense in hardware and...

Guido Sanchidrian | 03 Jan 2012 | 1 comment

In my last Blog article I wrote about the challenges of mobility and I outlined how to stay secure online whilst traveling. In general, information access is becoming mobile and device-agnostic. This results into new risk implications.

First, everything is revolving around people and information. Devices like desktops, laptops, tablets or smartphones are irrelevant. The most popular devices today won't likely have the same popularity three years from now. Also the applications don't matter that much, because it is not important if organisations use on-premise mail server today and tomorrow they use a cloud-based email service. It is just about getting the information from one place to another. What matters is the people and the intellectual property, the formula to the new chemical compound for example, or credit card details. It is about the data, and the information.


Guido Sanchidrian | 24 Dec 2011 | 2 comments

As a frequent traveller, going online has become universal for me. I expect Internet access wherever I am for whatever I need. However, when I am on the road, accessing the Internet can be challenging. Connections may be not only slower but also at greater risk, especially when connecting to public networks or using a public computer in the hotel. The key to using the Internet securely while travelling is to understand these additional risks, use caution, and be prepared.


One of the most effective ways you can protect yourself when travelling is to first take simple, preventive steps before you leave. If you are using a corporate image notebook, most of the following tasks are likely maintained by your IT desktop management, but nevertheless worth to check frequently by your own, in particular if this is your own device that is not managed by IT.

  • Ensure your laptop and smartphone operating systems and applications have the latest version...