Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Orla Cox | 13 Nov 2014 | 0 comments

The Evolving Threat Landscape is something that is constantly referenced, but just what is that ‘landscape’ and what does it mean for organisations intent on keeping themselves safe from attacks? In essence, the threats are emanating from a number of directions, but, broadly speaking, can be categorised under ‘Cybercrime’, ‘Sabotage’, ‘Subversion’ and ‘Espionage’. It’s a murky world and one that needs to be understood and recognised for the dangers it presents, if the right steps are to be taken to ensure effective protection.

Just to get some idea of the scale of what has been happening, Symantec’s own security intelligence indicates that, in the world of cybercrime alone, more 1,400 financial institutions have been regularly attacked with ‘Financial Trojans’ since 2013, affecting 88 countries, with a tripling of infections. The USA,...

Caroline Dennington | 09 Nov 2014 | 0 comments

The recent Symantec Vision 2014 event in London – the culmination of four such global events that also took in Munich, Paris and Dubai – was packed with presentations, break-out sessions and panel debates on the key industry issues of the day. But nothing captured the minds of the delegates present more than the insights they gained into the company’s decision to divide its business into two separate trading organisations: one focused on Information Security and the other on Information Management.

The big question everyone wanted answers to was why this was happening and Simon Moor, VP of Symantec UK & Ireland, laid out the reasons in his keynote speech: “The evolution of the security and storage industries just continues to grow and accelerate. We believe it’s absolutely clear that we need distinct strategies that address both. We need focused...

Symantec Analyst Relations | 07 Nov 2014 | 0 comments

Vision 2014 – EMEA Roadshows

Following the flagship Vision conference in Las Vegas in May this year, Symantec hosted a series of one- and two-day events in Dubai, Munich, Paris and London. Attendees had the opportunity to experience Symantec products, learn about the latest product roadmaps, hear customer testimonials and network with Symantec executives and key partners.

Please check out the dedicated site on Symantec Connect to access presentation materials and visit Symantec on YouTube to watch keynote sessions and other videos from the events:

London 2014 Vision Symposium Session...

FranRosch | 06 Oct 2014 | 0 comments

Security is deeply personal. Every day, we see examples of private information being exposed or exploited. At Symantec, we want to give people confidence – whether they’re sharing photos or shopping from a smartphone – that we are working constantly behind the scenes to keep their information protected.

So, in a move to streamline nine core offerings into one easy-to-use flagship subscription service, Symantec has announced the availability of Norton Security. The new service is an advanced multi-layered protection solution that helps shield consumers from sophisticated and evolving threats across all platforms. Norton Security is also available with integrated backup capability to help ensure photos, address books and important files don’t get lost.

According to...

tgrandpre | 02 Oct 2014 | 1 comment

Symantec Mobility: Suite 5.0 is almost here – building on our commitment to a new strategy, unveiled with the release of 4.0, to streamline and simplify the solution, so it can deliver significantly improved performance for customers and partners. The SaaS version is already out, with On-Premise scheduled for early October.

Symantec Mobility Suite 5.0 will:

  • Offer a single console with flexible, modular packaging
  • Improve the user experience (streamlined tasks and enrollment)
  • Support Windows Phone 8.1, Samsung SAFE, and Apple iOS 8.
  • Simplify Android device enrollment

Why does 5.0 matter so much? Because it is the most significant release to date for mobile management. While mobility offers ‘any device, any time, any place’ productivity, appealing to both enterprises and employees, that same flexibility comes with challenges – protecting corporate data on devices, separating personal and corporate information, managing...

msmart007 | 01 Oct 2014 | 0 comments

A question that comes up increasingly in our constantly changing world of security is: “How does data centre security differ from network and end-point security?”

There are a number of fundamental differences and it’s worth taking a look at some of these. For example, when it comes to the data centre, there are more constrains on security, in terms of performance – i.e., not standing in the way of innovation. In fact, performance becomes a real issue, because of the speed of change and innovation, but also in terms of the performance of the systems and applications that are running; especially as security can slow down applications and reduce capacity.

Another point to bear in mind is that the attack surface is about much more than simply the host. People don't necessarily think about applications running within the host, network devices (such as storage) and the user. That's where we will see real change in people operating the data centre, with customers often...

shankar_somasundaram | 30 Sep 2014 | 0 comments

Symantec is investing in the Internet of Things (IoT) – with different verticals like automotive, healthcare, industrial control systems, retail, being key areas of focus. And the reason isn’t hard to understand: IoT – connecting machines and devices together into functioning, intelligent systems – is a big, growing and diverse landscape that has permeated the industry at an astonishing rate and opened up vast opportunities, enabling unparalleled levels of automation and supply chain efficiencies.

Take industrial control systems (ICS), for example: they are now being connected to the Internet on a massive scale, with IoT bringing even greater acceleration of connectivity, not only in the production process and supply chain, but also right across all business processes. Organizations are increasingly embracing these innovations and moving towards improved interconnectivity, in the drive to be more globally competitive and gain a greater foothold in their market sectors.

Symantec Analyst Relations | 25 Sep 2014 | 0 comments

Originally posted in Security Response

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X (which is based around Unix). Known as the “Bash Bug” or “Shellshock,” the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.

The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and Unix. Bash acts as a command language interpreter. In other words, it allows the user to type commands into a simple text-based window, which the operating system will then run.

Bash can also be used to run commands passed to it by applications and it is this feature that the vulnerability affects. One type of command that...

Ilias Chantzos | 19 Aug 2014 | 0 comments

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally used to refer to all automated or computerised systems, in terms of both hardware and software – because cyber is the horizontal element that underpins economic life.

With globalisation enabled by transport technology, communications technology and global markets, and cyber used so widely within the economy and our personal lives, its reach extends deep into the political landscape. Cyber runs our economy, it can be used to reach large amounts of the population, for committing crime, be weaponised and it affects national security – and therefore the state – at its core. All of which means that it has a direct impact on public interest and therefore attracts political attention.


Symantec Analyst Relations | 18 Aug 2014 | 0 comments

The original blog is posted on Information Unleashed.

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.

With that in mind, we at Norton are making significant changes to simplify and strengthen our portfolio of security products. We are making it easier to select and buy the security products you need, and download and maintain them. As cybercriminals...