Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Symantec Analyst Relations | 14 May 2013 | 0 comments

This Blog was originally posted on In the Personal Cloud

Last November, we announced the beta version of Norton Zone, a new cloud file sharing service that allows users to safely and easily share the content that matters most. Today, I’m very pleased to announce Norton Zone is out of beta – stronger, faster and easier to use than ever. Also beginning today, users in the United States can buy additional storage, to expand the 5GB they continue to get for free.

The staggering growth of cloud services, mobile devices, and the social imperative to share anything is creating unique challenges. Almost all facets of our daily lives are “going digital,” and content is being created and shared in...

Robert Mol | 13 May 2013 | 0 comments

 

Creating competitive advantage by realising customers’ unmet and under-served needs is the goal of any progressive business. But you cannot achieve that in any meaningful way, unless you have a strategy that turns those customers into long-term, loyal and committed ones. In other words, believers in the solutions you design and offer them.

It is these principles that Symantec adheres to and has embraced in its 2013 Strategic Direction Plan, focused on three critical areas also defined as the 'Peaks' against which 'right for the customer' offerings are designed:

  • User Productivity & Protection
  • Information Security
  • Information Management: Availability & Scalability.

Importantly, this strategy has not emerged from any ‘deep bunker’ thinking, but from constant engagement with, and feedback from, customers and partners on precisely why they have opted for Symantec’s solutions...

Sian John | 02 May 2013 | 0 comments

A few weeks ago, online tech news site The Verge reported a security hole with Apple’s password reset software. All you needed to reset an Apple Id, it said, was a valid email address and date of birth. In this day and age, with personal details proliferating across the Web, it’s not hard to imagine how to get hold of either. 

The shame, perhaps, for Apple, is that the company was in the middle of implementing two-factor authentication for its mobile devices. To add insult to injury the registration process was three days, leaving anyone concerned about the security hole vulnerable to attack. 

On the upside, the breach has now been closed – it is no longer so easy to hack an Apple Id. However the situation does paint a stark picture of the state of play today, which brings together a...

Neal Watkins | 12 Feb 2013 | 0 comments

Symantec released its  2012 Corporate Social Responsibility (CSR) report at the end of October. It’s not for any company to make the final judgement on how well it rates in terms of CSR, but you can read independent reviews from environmental analysis firm TriplePundit and Ethical Corporation.
 
From the top, the report divides into three sections. Our People, which covers how Symantec develops as an inclusive, diverse organisation; The World, tackling how the company minimises its footprint and maximises its positive social impact; and Your Information, which specifically...

Sian John | 11 Feb 2013 | 0 comments

There is a lot of fear out there when it comes to dealing with the cloud, especially with so much hype surrounding the technology. However, what you do, and do not, commit to the public cloud is entirely your call.

To misquote George Orwell’s classic, ‘Animal Farm’: ‘All clouds are equal – but some are more equal than others’. The other key thing to remember is that not everything is for the cloud, so it’s a matter of each to its rightful place.

Information highly sensitive? Then use private clouds, so that you benefit from scalability and flexibility internally, without exposing your data to the Internet. Consider which are your crown jewels of information and what protection you have around these. Is it good enough? Should those defences be more robust?

The starting point is to look carefully at each workload when deciding which kind of cloud your data should be in. The relative merits of issues such as availability,...

Gerry Egan | 14 Jan 2013 | 0 comments

Microsoft’s latest desktop operating system release has been applauded as the most secure Windows ever – incorporating features including anti-malware out of the box, boot protection against rootkits and support for self-encrypting drives. So, does this mean we no longer need to think about Windows desktop security?

That the answer is (of course) “no” should not be taken as a comment on the strides Microsoft has made. Rather, it is more an indicator of where the boundaries now lie. To state the most obvious point first, no operating system can ever be 100% secure – indeed, security company Vupen claims to already have done just that.  

Even if an operating system proves resistant to attack, the bad guys know that the weakest link is the ‘human layer’ – that is to say, the people...

Sian John | 10 Jan 2013 | 0 comments

Yes, it’s that time of the year again, when industry analysts and commentators make their predictions about IT in general, and security in particular. We can expect all the usual – the main industry trends such as cloud and mobile will of course be in the bag, as well as potential recurrences of major security breaches – user data leaks from online sites, defacement or denial of service attacks on high-profile web sites and so on.
 


While it’s the same every year, this period is also a good moment to reflect on the security landscape and how well prepared we are for the year to come. While all of the above are symptoms, security breaches tend to be caused by people so a good starting point is to get into the heads of the perpetrators – the mad, bad and sad individuals that cause our organisations so much grief.
 


So, why do...

Sian John | 19 Dec 2012 | 0 comments

Do email and messaging security still matter, against the current background of social networks, consumerisation, mobile and bring-your-own-device? The answer, according to a recent report from two industry groups, is a resounding yes. However, given this rapidly changing technology landscape, the way that it matters has changed – so our behaviour needs to change accordingly, both at an individual and an organisational level.
 
The cross-vendor Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) collaborated with anti-spam organisation the London Action Plan (LAP), to produce the report. Among the contributors was our very own Eric Chien, Technical Director of the...

tzambrovitz | 01 Nov 2012 | 0 comments

Ask anyone who has worked in IT for any length of time, and they will tell you the devil is in the detail. While a product might look great on paper or as part of a well-rehearsed demo, post-deployment the grass may not be so green. Frequently, the biggest issues with implementations or upgrades are caused by integration with technologies already in place. The more embedded a product is in the infrastructure, the more likely it is to hit challenges.

As Symantec is, essentially, a purveyor of infrastructure products and services, we are acutely aware of such issues – indeed, it is our business to help organisations of all sizes reduce the risks that they cause. And given that no technology has had a bigger issue on IT infrastructure over the past decade than virtualisation, we have made it our business to help organisations address that, too.

At VMworld this summer, we announced no fewer than...

DLamorena | 09 Oct 2012 | 0 comments

Imagine the scene: a free-standing data center is perched precariously on the ledge of a building, 250 feet off the ground. It hovers there momentarily – and then plummets through the air, landing at a speed of 120ft/sec, with a deafening crash.

Seconds later, with the debris of the wrecked DC scattered in all directions, a second, identical data center, up on that same roof, effects a full recovery of the data and application. Symantec’s experiment in disaster recovery has been a resounding success.

The point being that businesses need 24/7 availability of their data and applications to keep their operations running smoothly and customers happy – which puts a major strain on organisations to maintain that level of service constantly.  Not only must they be ready for the worst case scenario of their data centers suddenly being out of action. They need to be able to recover the situation – fast.

It was with this in mind that Symantec...