Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
IT Industry Trends
Showing posts in English
NickWood | 27 Sep 2012 | 0 comments

As I meet with customers and partners and keep abreast of IT related news in the media, I see a number of commonly repeated business and IT related challenges - cost containment (reduce CAPEX or move it to OPEX), improved IT agility and better alignment with the business, enhanced information security and governance requirements, and how to meet increased resilience objectives.

Many of these are fairly well known challenges and no single solution appears to exist that address them all. The cloud conversation tends to come up pretty quickly as one of the “ways forward”. In this short l blog I will share with you my thoughts on other ways I see businesses reviewing and implementing strategies to transform their IT delivery platform.

Commoditisation: as components and services become less easy to distinguish between they become commoditised. To an extent we’ve seen with ERP/CRM systems, where previously huge expense in hardware and...

Guido Sanchidrian | 18 Sep 2012 | 0 comments

Mobile devices have made instant access to personal and confidential data crucial to our day-to-day lives. Safeguarding this confidential data is a complex challenge for any organisation. A growing number of companies are turning to workplace monitoring and data loss prevention (DLP) technology to enable an automated, process-oriented way of identifying and managing confidential data on networks, datacenter servers, workplace desktops as well as mobile devices.

But tablets, smart phones and other mobile devices have blurred the line between our professional and personal lives. As a result, employees use the same devices to electronically connect to fellow employees, customers, prospects as well as their families and friends.

Therefore monitoring employee communications becomes a real challenge in balancing between fundamental privacy rights of the employee and the recognized rights of an employer to control the business and protect the legitimate interests.


Guido Sanchidrian | 08 Aug 2012 | 0 comments

"Big Data" is one of the new buzzwords in IT. So it was just a question of time when "Big Data" hits the Information Security arena. Last week I saw a press release from Information Security Forum (ISF) - a very well established non-profit association of leading organisations from around the world. Their latest report shows how "Big Data analytics can improve information security and increase cyber resilience".

For sure "Big Data" analytics have become a standard practice in many aspects of business. Data warehousing, Business Intelligence, visualisation and a variety of sophisticated analyses are commonplace.

In their press release ISF say that "...the insights they [sophisticated analyses] can provide are not yet being widely realised in information security".


My initial thought whilst reading the press...

Guido Sanchidrian | 26 Jul 2012 | 0 comments

Today I found a small article in my daily RSS feeds titled "Miracle Battery-Saver App Harvests Email Addresses for Spamming". The article is a brief analysis of a malicious application that tricks the user by pretending to do something great for saving his/her mobile phone battery life.
It immediately raised a foundational question in my mind: Why do people still trust those type of miracle offers, even clicking on "allow" to the application's permission request to read the user's contacts data (in order to acquire the personal data) and the second permission asks to access the Internet (in order to upload the personal data)?

Theoretically, Spam and its associated malicious code should be extinct already, because every computer user should be aware more or less that this bad stuff exist, and should be suspicious...

Guido Sanchidrian | 04 Jul 2012 | 0 comments

The role of the board of directors in Enterprise Risk Management (ERM) is changing significantly and becomes increasingly challenging due to major trends like cloud migration or big data, as well as initiative in mobile computing such as Bring-Your-Own-Devices (BYOD).

The board of directors and senior management have to re-think periodically their ERM approaches, concepts, techniques and tools to meet new business objectives and to achieve processes enhancements.

Adopting a structured approach to ERM by using industry best practices such as COBIT, COSO, ISO 31000, ITSM/ITIL, etc. provides a vital instrument to develop a common language that builds a "community of purpose" between operations and strategic business, and facilitates the discussion across the organisation.

Cloud computing in particular impacts the full bandwidth of financial risks, infrastructure risks, market risks as well as reputational risks. In the latest paper published by the...

fbunn | 11 Jun 2012 | 0 comments

The Cloud Services market is already a big battlefield. As Forrester forecasts that the global market for cloud computing will grow from $40.7 billion in 2011 to more than $241 billion in 2020, more and more companies are entering this market in order to get a BIG piece of the cake.

Of course Cloud represents a significant opportunity for Telcos and Communications Service Providers (CSPs) as well. Their traditional voice revenue is flat or even declining for sometime and cloud services offered to their customers can promise a turnaround. Indeed CSPs are in a superb position to add cloud services to their existing portfolio. Their huge customer base, the IT infrastructure based on data centers, customer care centers and billing systems, their networks and a great services roadmap starting from their traditional communication business provide an excellent starting point. One of their biggest advantages is the trust they have built in the past with strong Service Level...

Guido Sanchidrian | 20 May 2012 | 0 comments

The last few days I spent some time to digest the latest Symantec Internet Security Threat Report Volume 17. This comprehensive report provides an overview and analysis of the year 2011 in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.

I am an active member of the Cloud Security Alliance Mobile Working Group, where we actually do research on secure mobile endpoint computing, which will result into valuable guidelines to be published this year. Therefore my Threat Report reading was likely shorten through the lense of this particular area.

In 2011, mobile threats are somewhat evolving as we have already seen in...

Robert Mol | 15 May 2012 | 0 comments

The more I'm on the road meeting with customers, partners and industry colleagues, the more I'm convinced we've come to a crossroads, where traditional client server IT is now finally giving way to a more flexible and accessible information-driven alternative.

This may be familiar to many already; however there’s no doubt that a sea change is taking place in the conversations on this subject from a year ago compared with where we are today. The underpinnings of that change are not entirely driven by technology but by the world of the Digital Native. The Digital Native was born into a world of Internet, readily available access to all information and having an "always connected" lens on the world. The Digital Native uses his or her social networks to communicate, is open about it, and only engages with the enterprise if enabled to interact in this relatively new form. 

Why, you might think is this relevant to a discussion about Cloud...

Rob-F | 19 Apr 2012 | 0 comments

Symantec is going to be a main sponsor in the biggest VMware Forum events across EMEA.  The first event comes shortly after our recent announcement at the RSA conference that five new security integrations with the VMware cloud infrastructure suite have taken place (check out the press release  here).  These integrations are designed to deliver extensive protection for virtual and cloud environments along with operational cost savings.

We will be at all the events listed here, where you can learn more about how joint Symantec and VMware customers are being enabled to protect their virtual infrastructure and business-critical applications as a result of this recent announcement.  You can register here


Guido Sanchidrian | 18 Mar 2012 | 0 comments

Late January 2012, the EU Commission presented the first proposal of a comprehensive reform of the existing EU Data Protection Directive. No doubt, the current Data Protection Directive requires more than just a slight refreshment, it requires a significant re-design. It has been established in 1995, when less than 1% of the EU population used the Internet. Now 17 years later we are faced with a globally connected world with all its benefits and challenges.

The new proposal has the ambitious goal to harmonise the patchwork of different laws in force across the EU countries. It is complex and large, and is just the beginning of the process to enact new rules changing the existing data protection regime, which will likely take two years from now, or even more.

Not just since the date of presenting the proposal but even started before, there is an ongoing...