Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
tzambrovitz | 01 Nov 2012 | 0 comments

Ask anyone who has worked in IT for any length of time, and they will tell you the devil is in the detail. While a product might look great on paper or as part of a well-rehearsed demo, post-deployment the grass may not be so green. Frequently, the biggest issues with implementations or upgrades are caused by integration with technologies already in place. The more embedded a product is in the infrastructure, the more likely it is to hit challenges.

As Symantec is, essentially, a purveyor of infrastructure products and services, we are acutely aware of such issues – indeed, it is our business to help organisations of all sizes reduce the risks that they cause. And given that no technology has had a bigger issue on IT infrastructure over the past decade than virtualisation, we have made it our business to help organisations address that, too.

At VMworld this summer, we announced no fewer than...

DLamorena | 09 Oct 2012 | 0 comments

Imagine the scene: a free-standing data center is perched precariously on the ledge of a building, 250 feet off the ground. It hovers there momentarily – and then plummets through the air, landing at a speed of 120ft/sec, with a deafening crash.

Seconds later, with the debris of the wrecked DC scattered in all directions, a second, identical data center, up on that same roof, effects a full recovery of the data and application. Symantec’s experiment in disaster recovery has been a resounding success.

The point being that businesses need 24/7 availability of their data and applications to keep their operations running smoothly and customers happy – which puts a major strain on organisations to maintain that level of service constantly.  Not only must they be ready for the worst case scenario of their data centers suddenly being out of action. They need to be able to recover the situation – fast.

It was with this in mind that Symantec...

John_Brigden | 19 Sep 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up from $21.5 billion in 2010, with spending forecast to more than double to $57.4 billion by 2014.

Right now, the European Commission is knee deep in finalising a strategy on cloud...

Symantec Analyst Relations | 12 Sep 2012 | 0 comments

The August edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from May 2011 through August 2012.

Report highlights

  • Spam – 72.3 percent (an increase of 4.7 percentage points since July)
  • Phishing – One in 312.9 emails identified as phishing (an increase of 0.109 percentage points since July)
  • Malware – One in 233.1 emails contained malware (a decrease of 0.14 percentage points since July)
  • Malicious Web sites – 1 website blocked per day (a decrease of 49.8 percent since July)
  • The state of data breaches to date in 2012
  • A look at a malicious email scam that pretends to come from Symantec
  • A new Java zero-day vulnerability appears in...
Symantec Analyst Relations | 08 Aug 2012 | 0 comments

The July edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through June 2012.

Report highlights

  • Spam – 67.6 percent (an increase of 0.8 percentage points since June)
  • Phishing – One in 475.3 emails identified as phishing (a decrease of 0.003 percentage points since June)
  • Malware – One in 340.9 emails contained malware (a decrease of 0.023 percentage points since June)
  • Malicious Web sites – 2,189 Web sites blocked per day (an increase of 4.0 percent since June)
  • Olympic related scams and threats to keep an eye on
  • Web attack toolkit activity in the first six months of 2012
  • A roundup of the best blogs of the last month...
Neal Watkins | 22 Jul 2012 | 0 comments

St. Paul’s Cathedral has dominated the London skyline for more than 300 years, while almost everything around it has changed. From the street to the Shard, the traffic to the tourists, it’s all new, while the Cathedral has stayed the same. The same is true of the data that dominates our lives.

Although you might think data is constantly changing, it remains the one invariable in a dynamic IT landscape. Anyone the wrong side of 40 will remember the different eras of IT. First we had the mainframe period, then the dawn of the PC, followed by the brief, bright light of client/server computing. Next came the Internet and collaborative computing. Throughout the last 30 years, the bedrock of all those eras has been data. Yes, there’s more of it—unstoppable amounts in fact—but it’s always been there, always needed to be protected, secured, and kept available.

Right now, we’re in the post-PC era, where everything is Cloud-enabled, and...

GregDay-SecurityCTO | 10 Jul 2012 | 0 comments

Attacks by viruses, trojans and other malware have often been considered as a Microsoft problem. Whilst Microsoft may have initially been slow to realise the significance and impact of malware, with  Windows XP Service Pack 2 and Microsoft’s Trustworthy Computing initiative, led by a former FBI agent, that the company started to get on top of the challenge.

Despite what the anti-Redmond crowd have blogged over the years, however, hackers didn’t target Microsoft products exclusively because they were insecure, or because the people involved had some ideological death-wish on the company. No – they did it because Microsoft was the most used end-point device environment in the world. Bill Gates’ “Windows Everywhere” ambition, once realised, made it the most obvious of all targets.

When times change, however, they don’t necessarily follow the script. In the personal computer era, the debate was about whether Linux (and more...

Orla Cox | 04 Jul 2012 | 0 comments

Much has already been written about the ongoing analysis into the code, sources and likely consequences of the 'Flame' or 'Flamer' malware program. Even at this early stage however, there's one aspect that continues to set it apart: its complexity.

W32.Flamer, to give the malware its technical name, is over 20MB in size - which makes it an order of magnitude bigger than its contemporaries. Our analysis to date has revealed that it contains a number of self-contained modules including screen capture, database management, Bluetooth, secure transmission and even self-destruct capabilities.

While its role as a targeted espionage tool is already evident, some purposes of this particular piece of malware are still to become clear.  It appears extremely well...

Symantec Analyst Relations | 26 Jun 2012 | 0 comments

By Francis deSouza, Group President, Enterprise Products and Services

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

With every ring of its cash registers, Tesco is getting smarter. Each month the company collects billions of pieces of information on its customers’ shopping habits and uses them to adjust its promotions and pricing, giving the company a huge competitive advantage. In essence, this British retail giant is harnessing the power of data analytics in order to help put the “I” back in Information Technology.

And Tesco is not alone. From confidential customer data to intellectual property to financial transactions, organizations possess massive amounts of information that not only enable them to be productive and competitive, but also grow their business.  In fact,...

Symantec Analyst Relations | 25 Jun 2012 | 0 comments

By Patricia Titus, Vice President and Chief Information Security Officer

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

Security leaders have come a long way, from backroom IT gurus to earning a seat at the executive table. Today, boardroom discussions increasingly focus on security threats and risk management and CISOs are being asked by the CEO “How secure is our online e-commerce site?” or “Are we at risk of being attacked by hackers?”

As a security leader, your answer to these questions can determine whether you get the resources and support needed to manage the risks to your organization. Therefore, the ability to answer these kinds of questions in a way that resonates with business executives is critical.

To do this, you cannot rely on the technical dashboards of IT GRC solutions past. While...