Video Screencast Help
IT Industry Trends
Showing posts in English
Dianed | 18 Jan 2013 | 1 comment


Mobile is going mad—growing exponentially and absorbing more and more of our everyday business and personal lives. We therefore posed some thought-provoking topics to Symantec experts and influencers in the mobile field, gathering expert opinions on topics like the Consumerisation of IT, and what impact the influx of consumer technology will have on business. 

Join the conversation below. We are eager to discover your thoughts, your experiences, and your vision.

What will the future working week look like?

When 3G technology burst into mainstream mobile telecommunications, we all though office life would be getting an obituary. A...

Dianed | 07 Jan 2013 | 1 comment


With the ever-growing trend of Mobile, we posed some interesting topics to Symantec experts and Influencers in this field to gather expert opinions on the topic of Consumerisation of IT, The Influx of consumer technology into business.  Join our conversation below as we are eager to find out what your opinion and recommendations are.

The Consumerisation of IT: The influx of consumer technology into business.


More and more people are bringing personal devices into their place of work. Smartphones, tablets and other handheld technologies were originally purchased for personal use. Now, in the new era of Bring Your Own Device (BYOD...

NickWood | 04 Oct 2013 | 0 comments

Software defined storage (SDS) is a term that seems to have spread like wildfire in the last few months. But what actually is it and what are the benefits of it? In this post, I share my thoughts based on current research and conversations with peers.

SDS feels very much feels like a marketing term at the moment - used by vendors to capture mindshare and attachment to the broader topic of software-defined datacentre - a term popularized by VMware last year. For further reading on software-defined datacentre implementations, please review the following VMware case study that features Symantec’s recent internal transformation.

SDS, rather than being an actual product, is really an architectural outcome for next generation storage designs. Founded on storage virtualization, SDS uses abstraction to pool storage from commodity hardware to provide flexible,...

Guido Sanchidrian | 11 Jun 2013 | 1 comment

Like all fathers in the world, I want the best for my children, including the ability to leverage the latest in technology. In today’s world, my children need to understand technology not only to be competitive in their education and careers but also in many cases to develop and maintain active social lives. However, with these capabilities come risks – risks that my children are often not aware of or prepared to deal with. I am in the lucky position to know a lot of these risks due to my daily work in IT, and nearly every day I am scared about the ignorance and lack of knowledge from many parents I am talking to. As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves. Therefore I want to explain the top three threats to our children and how we can help them stay safe online.


To protect your children, you have to first understand the dangers they face online. By understanding these...

NickWood | 10 Mar 2013 | 0 comments

Data growth remains one of the most common topics of conversation I have with organisations. Pick any research study, and it will show you that data growth is relentless—more than 40 percent per annum most argue—and that pace of growth shows no sign of stopping. The largest growth area is in unstructured data: the data that resides outside structured databases.

The rapid adoption of mobile and cloud service’s extends where information resides beyond the traditional data centre boundaries. This creates new challenges around the management and protection of an organisation’s information.

From my conversation organisations are no longer solely focused on how to tame this growth. Techniques like de-duplication, space-optimised snapshots, compression and archiving are all essential tools and commonly used to better manage this growth. Now, the conversation is turning to other related matters, such as how to get better control and leverage of...

Guido Sanchidrian | 14 Feb 2013 | 0 comments

Symantec study shows employees steal corporate data and don’t believe it’s wrong:

NickWood | 12 Dec 2012 | 0 comments

In my previous blog I outlined the topic of IT service assurance and the five key things to consider if you are looking to transform your IT department or simply operate it more efficiently with existing assets.

In this blog I will focus on the topic of IT continuity.

With hurricane Sandy recently tearing through the North East of the United States, businesses have been reaching once again for their business continuity plans (BCP). The broad topic of business continuity management (BCM) covers all facets of how to minimise risks and ensure continual delivery of business services, IT being one of the key elements.

Given the devastation a hurricane and other natural disaster can cause shouldn’t all businesses build BCM plans to accommodate these situations? Well yes, in the ideal world businesses would minimise or remove all risks - if money was no object. However, in reality budgets are limited and there’s often a reticence to sure up defences for...

petergrimmond | 07 Nov 2012 | 0 comments

In my previous blog, I outlined how unmanaged information growth is becoming unacceptable for enterprises.  The risks and costs associated with the growth and proliferation of unstructured data are becoming too great.  And businesses are failing to exploit the value of information assets effectively.

So, given the sheer volume of information involved, how should an enterprise embark on an Information Governance programme? 

Step 1: Reduce data loss from the enterprise perimeter

For many organisations, the greatest information governance fear is that critical information will leak out into hostile hands.  The consequences of data loss can be catastrophic: Symantec and Ponemon Institute’s report on the Cost of a Data Breach puts the average cost to an enterprise at £1.75m in the UK and $5.5m in the US.

Given these potentially...

Swarna | 04 Nov 2012 | 0 comments

A trip of firsts - that's what it was for me. First time for Gartner Symposium, first time to Orlando, first show where I led the mobile discussions and first Gartner show at which I presented - even if it was just a 20min theater presentation on the show floor. What a memorable and exciting learning experience for me! As I headed home, I took the learning, introductions, musings and experiences with me.

Most of my conversations at the Symposium were with our customers who swung by the Symantec booth to say hello or with those who have heard about/been told to go to Symantec to hear and see our mobile products in action.

"I have all these users that want to bring their iPads/iPhones and ask me to give them corporate access on those devices. Sometimes it is just email, but sometimes it is more than that. How can I do that and still know my corporate information is secure?"

"I don't want to manage all those mobile devices that my...

petergrimmond | 02 Nov 2012 | 0 comments

For many enterprises, managing the growing volumes of data is becoming a major challenge.  Data centre storage volumes continue to grow in excess of 40% per annum.  And this is only the tip of the iceberg: ever more enterprise data is now found not only outside of the datacentre, but outside of the physical boundaries of the enterprise - on laptops, tablets and smartphones - as well as in the Cloud.

Many enterprises now consider unmanaged data growth to be simply unacceptable.  This is evident from the number that are embarking on Information Governance projects.  According to the recent Symantec 2012 State of the Data Center Survey, over 90% of organisations are either actively discussing information governance or have implemented trials or actual governance programs.  In addition, about one-third have already implemented information governance solutions.

But what is driving this focus on information governance?  From my discussions with...