Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Sarah Whipp | 17 May 2012 | 0 comments


We’re hearing a great deal about 'information' in the media at the moment. According to both analysts and the word on the street, businesses have greater access to a broader set of information than ever they did in the past. As one of the main areas of impact, we are told, is in marketing and advertising (LINK:, I'm clearly going to be interested.


Information is the foundation of marketing and business as a whole. And unless you analyse it correctly, any decision you make is based on hope, luck and gut feeling alone.  This has always been true, but as the amount of unstructured information grows, the challenge for companies is ensuring that their departments and teams use a common data set for critical business decisions.


Information growth and real time access is a blessing to companies...

Symantec Analyst Relations | 30 Apr 2012 | 0 comments

Symantec’s Internet Security Threat Report showcases the threat landscape in 2011, highlighting that the number of malware attacks increased by 81 percent. Read the report to get the latest on key trends including advanced targeted attacks that are expanding to focus on organizations of all sizes, increased data breaches, and a continued focus on mobile threats by attackers.

Additional resources


GregDay-SecurityCTO | 24 Apr 2012 | 0 comments

A conversation I sometimes get involved in with customers is, "How should we secure vSphere?" The environment doesn't have to be VMware-based of course, it could be Xen, Microsoft, Red Hat or any other, but the question remains. 

From a technical perspective, the set of risks is reasonably well understood and by and large appropriate mitigations exist. For example each virtual machine, and the network connections between VMs need to be as secure as their physical equivalents. Meanwhile security holes could exist in the hypervisor layer, as with any other software package. Protections such as defence in depth, intrusion detection and prevention, patch management and so on remain much the same as in the traditional, physical world.

However, the net-new of a virtualised environment lies in how VMs are provisioned and managed. It is clearly much easier to deploy a virtual machine...

Jose Iglesias | 06 Apr 2012 | 0 comments


Isn't it funny how the human race can be so fickle? A few years ago, everybody - individuals, corporations, governments - was concerned about the future of the planet. To the extent that it coloured many discussions: "What's your green story?" was a pretty standard question for an industry analyst to ask, and public sector organisations were including sustainability criteria on their RFPs.


That was, of course, before the small matter of the global financial crisis, which understandably distracted attention from such altruistic aspirations. Current thinking suggests that we are happy to let our children's children worry about their own futures, while we concern ourselves with more pressing challenges such as keeping the business afloat, or putting food on the table.


Interestingly enough, the wave of attention about the planet's imminent collapse...

Marie Pettersson | 05 Apr 2012 | 0 comments

Consumerisation is nothing new. When personal computers first arrived (together with office and database software from companies like Lotus, WordPerfect and Microsoft) they enabled people with a bit of money to equip their home offices in much the same way as their workplaces. The key phrase here is, "with a bit of money," as the earliest adopters of home technology were frequently the more senior corporate staff. With a simple floppy disk drive providing the connection between home and work, executives were quickly impressing each other with their database prowess or skill in creating presentations. Roll forward a few decades and technology has become a lot more accessible and affordable.

These days we use the term 'consumerisation' to talk about smartphones and 'apps', use of online collaboration and storage, and indeed, having computers and printers at home that are often more powerful or functional than corporate-supplied kit. The...

D Thomson | 07 Mar 2012 | 0 comments

Over the years, I've seen a fair few maturity models applied to systems managementand IT service delivery, a while back “organic IT”, then “utility computing” and more recently to private cloud computing. In general they allaspire to reach “level 4” within the following model:


- 1 - Unstructured or chaotic - a free-for-all in which anything goes

- 2 - Structured - a basic handle on what's going on but still on the back foot

- 3 - Managed - things are properly under control and co-oordinated

- 4 - Dynamic - the kind of agile, responsive management all aspire to


Now I don't want to question such models, as they are generally pretty good. However, not many of the organisations I have visited have anything approaching level 4, or if they do, it is in a few isolated areas of the organisation. All the same, IT and business goes on so clearly they must be doing something right....

Symantec Analyst Relations | 01 Mar 2012 | 1 comment

Below you can find all blogs that have been posted on the AR Community site. Please feel free to comment and join the conversation.

Symantec Analyst Relations | 29 Feb 2012 | 0 comments

Socially engineered polymorphic malware spoofing a well-known North American business mediation and arbitration service

The February edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January 2011 and February 2012.

Report highlights

  • Spam – 68.0 percent (a decrease of 1.0 percentage points since January 2011): page 7
  • Phishing – One in 358.1 emails identified as phishing (an increase of 0.01 percentage points since January 2011): page 10
  • Malware – One in 274.0 emails contained malware (an increase of 0.03 percentage points since January 2011): page 12
  • Malicious Web sites – 2,305 Web sites blocked per day (an increase of 9.7 percent since...
Symantec Analyst Relations | 10 Feb 2012 | 0 comments

by Daniel Lamorena - Director Storage and Availability Marketing

Use of Linux in the data centre is continuing to grow. Looking at the year-on-year analyst figures from the likes of IDC, Linux server usage is increasing a few percentage points a year – this is largely down to Linux taking a bite out of legacy UNIX installations (Windows is holding steady). Organisations are not migrating away form proprietary platforms for altruistic reasons – making a shift can result in quite considerable savings in terms of both hardware and software. 

This doesn’t tell the whole picture, however. While Linux is pretty solid at a kernel level, it doesn’t offer as comprehensive facilities as commercial operating systems when it comes to more advanced features such as High Availability. This is less about...

GregDay-SecurityCTO | 09 Feb 2012 | 3 comments

Strip away all the technical jargon and a virtual machine management package is just a software program, which emulates a real computer for each instance of a virtual machine (VM). So, it will have virtual USB ports, virtual network connections, a virtual processor and so on, each of which will use up resources of the real, 'physical' machine.

Each VM instance will need to run an operating system and whichever applications it requires, as will the physical machine. In principle, it stands to reason that the total load on the physical processor at any moment in time is going to add up to the sum of all the OS'es, applications, device drivers, virtual machine management tools and whatever else is running, whether they are on a physical machine or a virtual machine.

With this in mind, a question we are often asked is whether anti-virus software should be installed on the physical machine, or in each virtual machine instance. At first glance you'd think...