Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
IT Industry Trends
Showing posts in English
tzambrovitz | 28 Sep 2011

Maybe somebody can explain it to me, because I’m not getting a clear picture of late from the numerous virtualization events I’ve attended. I’ve read the research, I’ve interviewed architects, systems administrators, consultants and even a few IT execs, and I’ve reviewed information from various vendors on the challenges and solutions around virtualization. So, is complacency the new IT strategy for business-critical virtualization? 

At a recent event that shall remain anonymous, I asked a few of the attendees at lunch what challenges they were facing as they virtualized their infrastructure. One immediate response was “budget”. Now, I understand that there are investments to be made in acquiring the infrastructure and software, and the time it takes to define and resource a project. But, in the face of reducing server provisioning from weeks to minutes, recovering failed systems in seconds and minutes...

Robert Mol | 27 Sep 2011

Malicious software can be a headache on a regular computer. But across an entire network infrastructure, these pieces of software can be an administrator’s worst nightmare. This makes network risk management a top priority for admins. With the diversity and complexity of modern IT infrastructure, however, risk management is a daunting task. Symantec Control Compliance Suite (SCCS) simplifies this process for both client desktops and for web apps, allowing effective and easy risk management across large systems. You can automate and review your entire security policy and integrate data from multiple sources to allow for easy review.

  • Manage the entire lifecycle of It policy: from conceptualisation and review, to distribution and end-user management
  • Certifications for the Public Sector
  • Compatibility with...
stuartbeattie | 26 Sep 2011

With Linux officially 20 years old, the globally deployed, pan-device operating system is a far cry from the hobby system launched by student Linus Torvalds. While Linux kernel engineers now number over a thousand however, its original developer still keeps a tight control over what goes in and what stays out. So, when the notoriously outspoken Finn speaks, people listen. But just how seriously should his recent remark, “Virtualization is evil,” be taken?

 

Linus Torvalds
Linus Torvalds - Photograph by...

Guido Sanchidrian | 23 Sep 2011

Darren Thomson is Symantec’s Chief Technology Officer (CTO) for the EMEA region. He holds the most senior technical position in the region and works within Symantec EMEA Technical Sales Organization (TSO).

As I meet Symantec customers and partners to talk about some of the impacts that virtualization, mobile and cloud computing are having on their businesses, I hear time and time again about the importance of information and about the fact that the governance and security policy that surrounds information will be key to ensuring successful transitions to new computing and service delivery models. In almost every case, though, the organisation that I am speaking to is (fundamentally) struggling with the same problem: “Where on earth do I start with all of this?” I hear a lot of potential answers to this question ("data...

paul dominjon | 08 Sep 2011

Many SMEs are discovering the advantages that virtualization can bring to their businesses. However, many are also putting their data at risk by failing to ensure that their virtualization solutions are properly secured and protected. Take a look at the infographic below for some surprising facts about small business virtualization security, and find out how you can protect your data...

Infographic: Virtualization Security for Small Businesses

 

To embed this infographic on your own blog or website, simply copy and paste the code below:

 

Robert Mol | 25 Aug 2011

Application virtualization is a great way to run non-native programmes on your computer, or to test unstable software versions without putting your computer at risk. Now, thanks to a bit of software made by Adam Moore from University of California, Merced, using a virtualized application can be even faster and easier than it was before.

Shortcut Creator

Adam’s software is called Shortcut Creator v.1.2. It allows you to create as many shortcuts as you want for programmes that run on layers created with SVS (Software Virtualization Solution). When you select the shortcut, it activates the particular layer that you have chosen. If...

Guido Sanchidrian | 23 Aug 2011

Security is one of the top concerns for business who are considering a virtualization solution. In our recent 2011 Symantec Virtualization and Evolution to the Cloud Survey we found that 76% of respondents said that security was a significant concern preventing companies from moving business-critical apps to virtualized servers. 63% also listed security as a major barrier to implementing server virtualization in the workplace. Symantec Endpoint Protection 12 was designed with protection of virtual infrastructure in mind. It allows organizations to deploy higher densities of virtual machines without compromising on security.

  • It takes much of the scanning out of each virtual machine, reducing scan overhead by up to 70 percent and disk input/output by as much as 90 percent
  • It prevents AV storms by ensuring that simultaneous...
barnaby_wood | 15 Aug 2011

As I've struggled my way through this last week on jet lag, limited sleep and caffeine at Symantec's Worldwide Sales and Marketing Conference, two things have struck me. The first is that Backup Exec has a special place in a lot of peoples' hearts. Its roots can be traced back around 30 years and there is a very real passion among the sales force and pre-sales groups in Symantec, within the channel partner community and among our customers too. We brought themed "Backup Exec Boot Camp" t-shirts and hats to the conference as prizes and throughout the week more and more employees and partners were wearing them - through their own choice. Supporters if you like, but certainly a very loyal following that’s prepared to shout about it from the rooftops. If you want to get one for yourself, look out for the regional Boot Camps we're going to be running...

Robert Mol | 12 Aug 2011

x86 virtualization is one of a select few truly unquestionable success stories in the modern IT landscape. It works well, has seen widespread adoption and it is a technology in the intriguing position of blurring the lines between two competing computing models. Those two models are the mainframe and the commodity PC. The mainframe model sees specialised hardware married to precision crafted software. Dozens or hundreds of individual processing units are joined together with the highest capacity interfaces available. The mainframe focuses on raw speed and software that ensures every last cycle is wrung out of the hardware available.

...

paul dominjon | 11 Aug 2011

It’s a classic nightmare scenario, but one that quite a few of us have faced over the years: loss of crucial data due to an error, failure or worse. To help combat that sinking feeling, the only realistic solution is to ensure that your data is backed up on a regular basis. There are lots of tools out there to help you do this, but we’re going to look at the specific example of Backup Exec 2010. This useful and powerful piece of software will help to allay any fears that a crash or mistake will result in hours of lost time - or gigabytes of lost data...

...