Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
bjornengelhardt | 29 May 2013 | 0 comments

by Bjorn Engelhardt, VP, Strategic Sales & Cloud – Asia Pacific and Japan, Symantec

Recently, myself and our new Symantec AR manager for APJ, Sancharini Mazumdar, ‘met’ online with a number of our key regional analysts to offer some insights into Symantec’s latest announcements and provide an update on the ‘Symantec Vision 2013’ for the region. Much of this vision is about solving customers’ largest unmet and under-served needs, while reducing complexity and increasing simplification.

This is all very much part of the revolution taking place within Symantec right now, the core of which is based on delivering more value for our customers – whether they be consumers, small businesses, large enterprises or countries all around the world. What will this revolution be based on? Most importantly, the goal of better meeting customer needs through internal innovation and driving faster organic growth. And it’...

Straners | 21 May 2013 | 0 comments

HOW TO AVOID THE DARK CLOUDS

It isn’t hard to see why Cloud-Based IT Services are becoming such a big draw for businesses – not when cloud is attracting more and more focus, as organisations seek out the best, and most efficient and cost-effective means of storing their essential (and often highly sensitive) data.

One question I’m asked time and again, though, is how fast is the move into the Cloud? You hear all sorts of stats and claims, so it’s time to put a bit of reality around this. If you look at our own latest in-depth survey on this here at Symantec – ‘Avoiding The Hidden Costs of the Cloud’ – it’s clear that customers really are rushing to leverage cloud services, as they extend the reach of their IT deep into the stratosphere. In fact, more than 90% of all organisations are at least discussing Cloud – a sharp step up from...

Symantec Analyst Relations | 14 May 2013 | 0 comments

This Blog was originally posted on In the Personal Cloud

Last November, we announced the beta version of Norton Zone, a new cloud file sharing service that allows users to safely and easily share the content that matters most. Today, I’m very pleased to announce Norton Zone is out of beta – stronger, faster and easier to use than ever. Also beginning today, users in the United States can buy additional storage, to expand the 5GB they continue to get for free.

The staggering growth of cloud services, mobile devices, and the social imperative to share anything is creating unique challenges. Almost all facets of our daily lives are “going digital,” and content is being created and shared in...

Robert Mol | 12 May 2013 | 0 comments

Creating competitive advantage by realising customers’ unmet and under-served needs is the goal of any progressive business. But you cannot achieve that in any meaningful way, unless you have a strategy that turns those customers into long-term, loyal and committed ones. In other words, believers in the solutions you design and offer them.

It is these principles that Symantec adheres to and has embraced in its 2013 Strategic Direction Plan, focused on three critical areas also defined as the 'Peaks' against which 'right for the customer' offerings are designed:

  • User Productivity & Protection
  • Information Security
  • Information Management: Availability & Scalability.

Importantly, this strategy has not emerged from any ‘deep bunker’ thinking, but from constant engagement with, and feedback from, customers and partners on precisely why they have opted for Symantec’s solutions and what...

Sian John | 02 May 2013 | 0 comments

A few weeks ago, online tech news site The Verge reported a security hole with Apple’s password reset software. All you needed to reset an Apple Id, it said, was a valid email address and date of birth. In this day and age, with personal details proliferating across the Web, it’s not hard to imagine how to get hold of either. 

The shame, perhaps, for Apple, is that the company was in the middle of implementing two-factor authentication for its mobile devices. To add insult to injury the registration process was three days, leaving anyone concerned about the security hole vulnerable to attack. 

On the upside, the breach has now been closed – it is no longer so easy to hack an Apple Id. However the situation does paint a stark picture of the state of play today, which brings together a...

Neal Watkins | 12 Feb 2013 | 0 comments

Symantec released its  2012 Corporate Social Responsibility (CSR) report at the end of October. It’s not for any company to make the final judgement on how well it rates in terms of CSR, but you can read independent reviews from environmental analysis firm TriplePundit and Ethical Corporation.
 
From the top, the report divides into three sections. Our People, which covers how Symantec develops as an inclusive, diverse organisation; The World, tackling how the company minimises its footprint and maximises its positive social impact; and Your Information, which specifically...

Sian John | 11 Feb 2013 | 0 comments

There is a lot of fear out there when it comes to dealing with the cloud, especially with so much hype surrounding the technology. However, what you do, and do not, commit to the public cloud is entirely your call.

To misquote George Orwell’s classic, ‘Animal Farm’: ‘All clouds are equal – but some are more equal than others’. The other key thing to remember is that not everything is for the cloud, so it’s a matter of each to its rightful place.

Information highly sensitive? Then use private clouds, so that you benefit from scalability and flexibility internally, without exposing your data to the Internet. Consider which are your crown jewels of information and what protection you have around these. Is it good enough? Should those defences be more robust?

The starting point is to look carefully at each workload when deciding which kind of cloud your data should be in. The relative merits of issues such as availability,...

Gerry Egan | 14 Jan 2013 | 0 comments

Microsoft’s latest desktop operating system release has been applauded as the most secure Windows ever – incorporating features including anti-malware out of the box, boot protection against rootkits and support for self-encrypting drives. So, does this mean we no longer need to think about Windows desktop security?

That the answer is (of course) “no” should not be taken as a comment on the strides Microsoft has made. Rather, it is more an indicator of where the boundaries now lie. To state the most obvious point first, no operating system can ever be 100% secure – indeed, security company Vupen claims to already have done just that.  

Even if an operating system proves resistant to attack, the bad guys know that the weakest link is the ‘human layer’ – that is to say, the people...

Sian John | 10 Jan 2013 | 0 comments

Yes, it’s that time of the year again, when industry analysts and commentators make their predictions about IT in general, and security in particular. We can expect all the usual – the main industry trends such as cloud and mobile will of course be in the bag, as well as potential recurrences of major security breaches – user data leaks from online sites, defacement or denial of service attacks on high-profile web sites and so on.
 


While it’s the same every year, this period is also a good moment to reflect on the security landscape and how well prepared we are for the year to come. While all of the above are symptoms, security breaches tend to be caused by people so a good starting point is to get into the heads of the perpetrators – the mad, bad and sad individuals that cause our organisations so much grief.
 


So, why do...

Sian John | 19 Dec 2012 | 0 comments

Do email and messaging security still matter, against the current background of social networks, consumerisation, mobile and bring-your-own-device? The answer, according to a recent report from two industry groups, is a resounding yes. However, given this rapidly changing technology landscape, the way that it matters has changed – so our behaviour needs to change accordingly, both at an individual and an organisational level.
 
The cross-vendor Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) collaborated with anti-spam organisation the London Action Plan (LAP), to produce the report. Among the contributors was our very own Eric Chien, Technical Director of the...