Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Symantec Analyst Relations | 22 Jan 2014 | 0 comments

As fans of Formula 1 eagerly await the new season, big changes are coming that will have a major impact on the sport. It’s something that Lotus F1 Team readily acknowledges will be a huge challenge. But they will be ready to take on whatever comes their way, they insist, just as their long-term partner Symantec is also embracing transformation throughout its business.

In fact, Lotus F1 Team sees itself and Symantec as being on something of a parallel journey, as they manage their rapidly altering business landscapes – very different, it might seem, yet driven by a common purpose: to be the best at what they do.

It is Symantec’s ability to achieve that goal, time and again, that has made Lotus F1 Team such a committed consumer and champion of its solutions. But first, back to those big changes in Formula 1. “For next season, the amount of fuel that can be used in a race is limited to 100kg, so none of the cars will have enough to finish the race,” Michael Taylor  ...

Giampiero Nanni | 07 Jan 2014 | 0 comments

Smart cities are on the increase worldwide and, especially within Europe, there are many such initiatives being stimulated by the EC and national governments. Local administrators and policy makers are under great pressure to make their cities increasingly competitive, in order to attract businesses, talent and taxpayers – and to comply with sustainable policies, greenhouse gas emission targets and carbon footprint guidelines.

What will they look like? In the main, smart city deployments will be multi-faceted, carried out by a diverse ecosystem of providers in innovative domains, involving state-of-the-art technology, including critical and complex ICT implementations. These deployments can address different components and city systems, such as Intelligent Transportation, Connected Healthcare, Public Safety and Security, Emergency Services, Smart Grid and Smart Metering, Intelligent Buildings, etc.

At the same time, increasing ICT complexity, hyper-connectivity,...

Straners | 19 Dec 2013 | 0 comments

Information is – slowly – moving outside the database. And it’s everywhere. Businesses want to get their hands on all the data that really matters, wherever it resides, because that is the strategy that will ensure they stay ahead of the game.

More and more, they are seeing both structured and unstructured data as their life blood, wherever, and in whatever format, that data presents itself. No matter whether it is ‘System centric’ (ie, it’s in the database) or ‘Information centric’ (it’s ‘out there’ somewhere), it has vast potential value, if it is harnessed and employed properly. Hence organisations are working to develop and deploy big data alongside their established business intelligence structure: that is where their future success lies.

The business opportunities that will assure their survival, growth and future well-being are locked within the flood of data that swirls around us. If they can relate details from across all of their digital information assets,...

Straners | 10 Dec 2013 | 0 comments

Few areas of IT seem to be gaining as much attention at the moment as cloud orchestration, as represented by OpenStack and CloudStack, VMWare and the like. The debates in the blogosphere and on social media could suggest nothing short of all-out war as different vendors and groups back one approach or another. 

To understand what's going on, it is best to start with the elephant in the room - Amazon, whose Elastic Compute Cloud(EC2) service (now part of its AWS portfolio) scared the socks off other vendors when it came to market - not least because it offered a fundamentally different approach to computing, compared to traditional, in-house systems. 

The Amazon model is based on the enormous power of virtualisation, which enables processing workloads to be allocated to computer hardware far more dynamically than was possible in the past. This is what gives EC2 its '...

D Thomson | 29 Nov 2013 | 1 comment

It is no secret to those who know me that I have become very interested in the coming together of IT (something that I know about) and Social Science (something that I don’t…. yet).

For those of you that are not familiar with the Social Sciences as a field of expertise, they comprise a number of disciplines (the well known ones being Psychology, Criminology, Politics and Sociology) and their goal is to try to make sense of how society is made, broken and repaired.

Why is this relevant to us in IT? Well, the Harvard Business School and many of the world’s leading technology movers and shakers are very concerned about a shortage of skills in the industry that span technology (“how do we create and manage data?”) with social science (“what does the data mean once we have it ?”).

The topic of Big Data, of course, is the driver of this concern about a skills gap. It’s all very well having access to a lot of data but...

Carey Nachenberg | 21 Nov 2013 | 0 comments

This blog will discuss a vision for ‘to-be state’ of enterprise security and targeted attack protection, and is the last part of this blog series.

In my last blog, I detailed the first step toward achieving our vision for enterprise security. To summarize, I proposed that we need to update our existing security products so they generate a steady flow of security-relevant telemetry (e.g., every login, failed or not, between every machine in the enterprise, metadata for every inbound email, every connection through the firewall, etc.) – even when that telemetry doesn’t appear directly related to an in-progress attack at the time it’s collected. This telemetry will be used in two...

Carey Nachenberg | 14 Nov 2013 | 0 comments

In my previous blog I talked about the as-is state of enterprise security. Now I’d like to paint a picture of a much better future state that I believe is achievable, and then I’ll tell you how we can make that state a reality.

First, in our ideal future state attackers don’t just go away, and let’s be honest, regardless of how advanced our defenses become, attackers will still find a way to penetrate them. So in our future state, we will not totally eliminate compromises – they will occur. However, we envision a future state where enterprises will either block the attacks outright, or discover them within minutes or hours of compromise, rather than the months or years it takes to detect many attacks today.  We further envision a future state where enterprises won’t need an expensive team of security experts or large numbers of proprietary integrations to achieve this level of protection. We envision a state where the...

D Thomson | 12 Nov 2013 | 0 comments

Over the past few weeks my colleagues and I had the opportunity to meet with many of you and even attend some of the industry events including analyst conferences. I felt the need to blog today, however, based on the level of excitement that I have been picking from my Symantec colleagues “I think we got it right…”, “At last, it feels like we are ahead of the curve…”, “It’s nice hearing that all of our efforts are aligned to where the industry is going..”.

What are my colleagues referring to? The Symantec 4.0 strategy and, more specifically, the almost spooky similarities between its intended outcomes and the trends in the market that you, the industry analysts, are telling us to watch.

Below I have highlighted some of the “Trends To Watch” and aligned them to some of the things we at Symantec are doing...

Carey Nachenberg | 07 Nov 2013 | 0 comments

Greetings, analysts!

My name is Carey Nachenberg and I’m a Symantec Fellow and Vice President in our CTO organization.  I’ve been with Symantec a whopping 23 years (if you count both my internships and full-time employment at the company) and have seen the company go through many changes over the years. However, I believe that the biggest changes are yet to come. 

Over the past two years, I’ve been working with technical leaders around the company on a new vision for the future of cyber-security – a vision that will finally address the targeted threat challenge, and one that promises to fundamentally change the way corporations implement and manage their security. Now that we have reached clarity on this vision, I’d like to share it with you in this three-part blog. 

I look forward your candid feedback and thoughts.

Part 1: The As-...

D Thomson | 28 Oct 2013 | 0 comments

In preparation for creating our Symantec 4.0 strategy, we took the step of listening to our customers. What company would ever say they didn't? By listening I mean really listening - we sat down with customers, individually and in groups, and asked what worked and what didn't, what they liked about Symantec and what they felt needed to change. 

We travelled the globe to take the views of companies large and small, from the widest variety of sectors. So, what did we hear? As we distilled down the notes taken from interviews and workshops, email exchanges and calls, we found that the essence could be summarised in two words: simplicity and integration.

So, first, simplicity. Of course enterprise organisations want to keep things simple - but technology today is increasingly complicated. Cloud services and consumerisation, mobility and remote working making it ever harder to manage information and mitigate risks. At the...