Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
IT Industry Trends
Showing posts in English
Robert Mol | 13 Mar 2012 | 0 comments

And then there was Cloud, Virtualization, and the most disruptive of them all, Mobile! How does the IT Manager prioritize in this age of constant consolidation and drive for efficiency? Is it the internal drivers for a more agile data center that can fire up a virtual server the minute a Business Unit Manager comes up with a new big revenue generating idea? Or is the adoption of tools that will help make life easier, more fun and above all more efficient for sales and other revenue focused teams, the priority?

The latter is obviously eluding to the rapid adoption of Mobile technologies with Tablets, in particular those from Apple, leading the way to a new and faster form of communication and information exchange. A form of BYOD?

Personally, I think BYOD has gone mainstream already by the simple fact that smart phones have already outsold PC's in 2011 and Apple even out shipped the PC in Q4 2011 with just the iPad! So why bring your own instead of asking IT to be...

Guido Sanchidrian | 18 Feb 2012 | 0 comments

In the past few weeks I was quite often involved into discussions about cloud security frameworks, proper attestation of security controls, and what criteria should apply for selecting cloud service provider.

The lack of a widely agreed cloud risk or cloud security standard (and an acknowledged certification process of it) makes it difficult for organisations to evaluate and select cloud service providers from risk perspective in addition to the business and cost benefit angle that the cloud service would provide.

Therefore many organisations fall back to already established in-house expertise in vendor selection, which is likely not fully adoptable for the selction of cloud service providers, or just mirror what other organisations do, even if those organisations likely have a different risk and maturity profile.

Hence the title of this blog article - One Size Fits None. That is usually my first answer to a lot of questions I have been asked around this topic...

Guido Sanchidrian | 03 Feb 2012 | 0 comments

Recently I commented a blog entry at "In Defense of Data" - a blog written by a variety of data security thought leaders and architects. The article is titled "Security and the Price of Coffee", and raised a very good point: Symbolically, a simple cup of coffee could be a mechanism for breaking the ice and building a relationship between IT Operations and the leaders of business units within organisations. Like the author of the article, I completely agree that many IT organisations act in silos. I share the same experience as the author; many times I walked in early to a customer meeting, I find the IT Security group introducing themselves to the leaders of other departments within their own organisations for the first time... Do I have to say more...

Guido Sanchidrian | 03 Jan 2012 | 1 comment

In my last Blog article I wrote about the challenges of mobility and I outlined how to stay secure online whilst traveling. In general, information access is becoming mobile and device-agnostic. This results into new risk implications.

First, everything is revolving around people and information. Devices like desktops, laptops, tablets or smartphones are irrelevant. The most popular devices today won't likely have the same popularity three years from now. Also the applications don't matter that much, because it is not important if organisations use on-premise mail server today and tomorrow they use a cloud-based email service. It is just about getting the information from one place to another. What matters is the people and the intellectual property, the formula to the new chemical compound for example, or credit card details. It is about the data, and the information.


Guido Sanchidrian | 24 Dec 2011 | 2 comments

As a frequent traveller, going online has become universal for me. I expect Internet access wherever I am for whatever I need. However, when I am on the road, accessing the Internet can be challenging. Connections may be not only slower but also at greater risk, especially when connecting to public networks or using a public computer in the hotel. The key to using the Internet securely while travelling is to understand these additional risks, use caution, and be prepared.


One of the most effective ways you can protect yourself when travelling is to first take simple, preventive steps before you leave. If you are using a corporate image notebook, most of the following tasks are likely maintained by your IT desktop management, but nevertheless worth to check frequently by your own, in particular if this is your own device that is not managed by IT.

  • Ensure your laptop and smartphone operating systems and applications have the latest version...
Robert Mol | 11 Oct 2011

When you’re operating across an entire network of terminals, inefficiencies and problems are bound to arise. Of course, there’s no way to eliminate these entirely, but there are ways to minimise them, by gathering more useful information, simplifying and improving existing processes, and ensuring administrators have all the necessary powers available. This is where Symantec Workspace Streaming can help. Your organisation may well be using the Symantec Endpoint Virtualization Suite already for the virtualization of your business-critical applications. Workspace Streaming is an add-on for this suite, which allows sophisticated application streaming.

  • License...
stuartbeattie | 05 Oct 2011

Virtualization management tools are important. In part one of this series we reviewed some of the basic features of proper virtualization management tools as well as how a lack of said tools could make managing a fleet of virtual servers as labor intensive as an equal number of physical systems. In this post, we'll explore some of the more advanced features of management tools, and how their implementation saves you significant time.

First, let's look at Virtual Desktop Infrastructure (VDI). VDI is an umbrella term for a collection of technologies whose purpose is to provide centrally-located desktop environments to remote users. These users can be using virtually any device, while the processing and storage requirements are handled entirely by the VDI server. Though VDI can be delivered in many ways, the most common option is to virtualise a client operating system and provide...

paul dominjon | 04 Oct 2011

When someone like Eric Schmidt, Chairman and ex-CEO of Google, says there’s an IT skills shortage in the UK, it’s time to take notice. On the upside, there are moves to get IT back into the national curriculum, but that will be scant comfort to companies wishing to employ skilled IT professionals. Exacerbating the issue is the fact that it isn’t absolutely clear what skills will be needed. In the words of one university lecturer, “We’re training students for jobs that don’t even exist.” This is true in all areas of IT, from information management and application development, to infrastructure design and systems administration. The result is a challenge for both recruiters and those prospecting for a job. Thinking specifically about the game-changing technology that is server virtualization, we know that it brings both opportunities and...

Robert Mol | 03 Oct 2011

If your computer keeps locking when you are trying to work, it can be really annoying. On your own Windows PC this isn’t a problem - you can just change the settings. But on a network or virtual system, this has been set by a well-meaning administrator, and you might not have the necessary privileges. These kinds of network regulations play an important role in terms of security, but for some people they are simply an impractical nuisance. This is where a clever little program called NoSleep comes into play. This free software prevents your PC from locking by keeping it active. How does it do this? It’s very simple: the mouse cursor moves by one pixel every 30 seconds. Barely perceptible, but it keeps your PC alert. It’s the digital equivalent of coffee, and can be a timesaver if you find yourself working on multiple workstations at any one time. If this sounds like just what you’ve been looking for, then don’t hesitate to...

bpascua | 29 Sep 2011

Brian de la Pascua is a data center specialist working in the Storage and Availability Management Group. He started with Veritas twelve years ago as a Netbackup Engineer, then moved onto the Storage Foundation and High Availability products. Brian joined Business Critical Services as a consultant for four years. He has been working in the Storage and Availability Management Group for the past three years helping architect solutions for Symantec customers' data centers.

For some years now, we have been on a journey with our customers - helping in them to overcome their data centre challenges, which varied considerable from one industry to the next. I joined Veritas 12 years ago, before it became part of Symantec, and at this time, the data centre was a predominately SUN environment and native tools were not seen as enterprise class. Back then, we worked with customers to help them to go to market safely, enabling them to have their data wrapped...