Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Neal Watkins | 22 Jul 2012 | 0 comments

St. Paul’s Cathedral has dominated the London skyline for more than 300 years, while almost everything around it has changed. From the street to the Shard, the traffic to the tourists, it’s all new, while the Cathedral has stayed the same. The same is true of the data that dominates our lives.

Although you might think data is constantly changing, it remains the one invariable in a dynamic IT landscape. Anyone the wrong side of 40 will remember the different eras of IT. First we had the mainframe period, then the dawn of the PC, followed by the brief, bright light of client/server computing. Next came the Internet and collaborative computing. Throughout the last 30 years, the bedrock of all those eras has been data. Yes, there’s more of it—unstoppable amounts in fact—but it’s always been there, always needed to be protected, secured, and kept available.

Right now, we’re in the post-PC era, where everything is Cloud-enabled, and...

GregDay-SecurityCTO | 10 Jul 2012 | 0 comments

Attacks by viruses, trojans and other malware have often been considered as a Microsoft problem. Whilst Microsoft may have initially been slow to realise the significance and impact of malware, with  Windows XP Service Pack 2 and Microsoft’s Trustworthy Computing initiative, led by a former FBI agent, that the company started to get on top of the challenge.

Despite what the anti-Redmond crowd have blogged over the years, however, hackers didn’t target Microsoft products exclusively because they were insecure, or because the people involved had some ideological death-wish on the company. No – they did it because Microsoft was the most used end-point device environment in the world. Bill Gates’ “Windows Everywhere” ambition, once realised, made it the most obvious of all targets.

When times change, however, they don’t necessarily follow the script. In the personal computer era, the debate was about whether Linux (and more...

Orla Cox | 04 Jul 2012 | 0 comments

Much has already been written about the ongoing analysis into the code, sources and likely consequences of the 'Flame' or 'Flamer' malware program. Even at this early stage however, there's one aspect that continues to set it apart: its complexity.

W32.Flamer, to give the malware its technical name, is over 20MB in size - which makes it an order of magnitude bigger than its contemporaries. Our analysis to date has revealed that it contains a number of self-contained modules including screen capture, database management, Bluetooth, secure transmission and even self-destruct capabilities.

While its role as a targeted espionage tool is already evident, some purposes of this particular piece of malware are still to become clear.  It appears extremely well...

Symantec Analyst Relations | 26 Jun 2012 | 0 comments

By Francis deSouza, Group President, Enterprise Products and Services

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

With every ring of its cash registers, Tesco is getting smarter. Each month the company collects billions of pieces of information on its customers’ shopping habits and uses them to adjust its promotions and pricing, giving the company a huge competitive advantage. In essence, this British retail giant is harnessing the power of data analytics in order to help put the “I” back in Information Technology.

And Tesco is not alone. From confidential customer data to intellectual property to financial transactions, organizations possess massive amounts of information that not only enable them to be productive and competitive, but also grow their business.  In fact,...

Symantec Analyst Relations | 25 Jun 2012 | 0 comments

By Patricia Titus, Vice President and Chief Information Security Officer

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

Security leaders have come a long way, from backroom IT gurus to earning a seat at the executive table. Today, boardroom discussions increasingly focus on security threats and risk management and CISOs are being asked by the CEO “How secure is our online e-commerce site?” or “Are we at risk of being attacked by hackers?”

As a security leader, your answer to these questions can determine whether you get the resources and support needed to manage the risks to your organization. Therefore, the ability to answer these kinds of questions in a way that resonates with business executives is critical.

To do this, you cannot rely on the technical dashboards of IT GRC solutions past. While...

Marie Pettersson | 15 Jun 2012 | 1 comment

A few weeks ago I hosted a banking sector CIO Roundtable on the topic of mobile technologies and their impact, both inside the enterprise and in how banks engage with their customers. Of particular interest was the whole area of mobile payments - not least because there still appears to be so much to play for in this still-developing area. We've seen some fantastic success stories in both developed countries and developing nations, where mobile payments are fast be coming the 'de facto' mechanism for currency transfers (but not necessarily with a bank behind it). In western economies, the opportunity for banks is to provide better services than the competition, increasing customer satisfaction and encouraging upgrades to enhanced facilities. 

Mobile banking is not without its challenges, however. It is easy to think that smartphones are where the action is, yet many banking customers still have simpler phones with SMS alone. Equally however, the mobile...

Sarah Whipp | 13 Jun 2012 | 0 comments

 

In my first blog I talked about the importance of having good data that is coherent across teams and departments. While it’s inevitable that groups will choose reporting periods that show them in the best possible light, senior execs need a single view of the truth.

But what about planning? It is easy to create forward projections that are more optimistic than realistic, particularly in the current financial climate. While can be difficult to predict buying behaviours with any certainty, however, it should be more straightforward to present sensible worst-case scenarios. But is it?

A long time ago, when I was an idealistic young marketing exec, I prepared a detailed business plan for one if my managers. He looked it through and threw it back at me. “That's no good,” he said, “I need a better worst case scenario.” In other words, one which wasn’t quite as bad. At the time I thought that was the craziest expression I...

John_Brigden | 12 Jun 2012 | 0 comments

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications...

Peter_E | 04 Jun 2012 | 0 comments

Data is one of our most critical assets, and we’ve all got too much invested in it to lose it. I'd say the same thing to an elderly relative about keeping valuable photos in a biscuit tin, as I would to a large corporation with a broken backup strategy and years of backup data. And, the chances are, I would get much the same response - a combination of agreement and an embarrassed shrug, suggesting the problem is clearly important, but that the same old approach works well enough for now. 

Where corporate backups are concerned, it's not as if people haven't tried to make change. Backup strategies have been around since someone first suggested putting punched cards in a fireproof safe. And these strategies have evolved as well, but a number of very real issues, not least of which include complexity and data growth now demand a new approach. 

Every few years an organization will make it a priority to update backup systems, storage and...

Sarah Whipp | 17 May 2012 | 0 comments

 

We’re hearing a great deal about 'information' in the media at the moment. According to both analysts and the word on the street, businesses have greater access to a broader set of information than ever they did in the past. As one of the main areas of impact, we are told, is in marketing and advertising (LINK: http://www.bbc.co.uk/news/business-17764117), I'm clearly going to be interested.

 

Information is the foundation of marketing and business as a whole. And unless you analyse it correctly, any decision you make is based on hope, luck and gut feeling alone.  This has always been true, but as the amount of unstructured information grows, the challenge for companies is ensuring that their departments and teams use a common data set for critical business decisions.

 

Information growth and real time access is a blessing to companies...