Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Symantec Analyst Relations | 01 Mar 2012 | 1 comment

Below you can find all blogs that have been posted on the AR Community site. Please feel free to comment and join the conversation.

Symantec Analyst Relations | 29 Feb 2012 | 0 comments

Socially engineered polymorphic malware spoofing a well-known North American business mediation and arbitration service

The February edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January 2011 and February 2012.

Report highlights

  • Spam – 68.0 percent (a decrease of 1.0 percentage points since January 2011): page 7
  • Phishing – One in 358.1 emails identified as phishing (an increase of 0.01 percentage points since January 2011): page 10
  • Malware – One in 274.0 emails contained malware (an increase of 0.03 percentage points since January 2011): page 12
  • Malicious Web sites – 2,305 Web sites blocked per day (an increase of 9.7 percent since...
Symantec Analyst Relations | 10 Feb 2012 | 0 comments

by Daniel Lamorena - Director Storage and Availability Marketing

Use of Linux in the data centre is continuing to grow. Looking at the year-on-year analyst figures from the likes of IDC, Linux server usage is increasing a few percentage points a year – this is largely down to Linux taking a bite out of legacy UNIX installations (Windows is holding steady). Organisations are not migrating away form proprietary platforms for altruistic reasons – making a shift can result in quite considerable savings in terms of both hardware and software. 

This doesn’t tell the whole picture, however. While Linux is pretty solid at a kernel level, it doesn’t offer as comprehensive facilities as commercial operating systems when it comes to more advanced features such as High Availability. This is less about...

GregDay-SecurityCTO | 09 Feb 2012 | 3 comments

Strip away all the technical jargon and a virtual machine management package is just a software program, which emulates a real computer for each instance of a virtual machine (VM). So, it will have virtual USB ports, virtual network connections, a virtual processor and so on, each of which will use up resources of the real, 'physical' machine.

Each VM instance will need to run an operating system and whichever applications it requires, as will the physical machine. In principle, it stands to reason that the total load on the physical processor at any moment in time is going to add up to the sum of all the OS'es, applications, device drivers, virtual machine management tools and whatever else is running, whether they are on a physical machine or a virtual machine.

With this in mind, a question we are often asked is whether anti-virus software should be installed on the physical machine, or in each virtual machine instance. At first glance you'd think...

D Thomson | 01 Feb 2012 | 0 comments

With many organisations giving cloud computing serious consideration, a question we are often asked is, "Should we be putting our data in the cloud?" Organisations should be concerned about their data, wherever it is - it's a strategic business asset, after all. Indeed, this concern should extend to wherever the data is, depending on what it is and how it is being used. 

Each organisation is different and no blog post would be long enough to map out all the different risks and options, but we can get an idea of where to look for causes of concern. Here we separate risks out into non-scientific but nonetheless helpful categories of security, privacy, supplier and compliance. 

Security risks first, then. When we say data need to be kept secure, what we're really thinking is that malicious third parties can't get hold of it, to use or damage it in some way. Of course you need some kind of assurance that a cloud provider is protecting your...

Symantec Analyst Relations | 26 Jan 2012 | 1 comment

This month’s report takes a closer look at how spammers are taking advantage of major calendar events (The New Year, Valentine’s Day and the Olympic games) to target potential victims.

Report highlights

  • Spam – 69.0 percent (an increase of 1.3 percentage points since December 2011): page 5
  • Phishing – One in 370.0 emails identified as phishing (an increase of 0.06 percentage points since December 2011): page 7
  • Malware – One in 295.0 emails contained malware (a decrease of 0.02 percentage points since December 2011): page 9
  • Malicious Web sites – 2,102 Web sites blocked per day (a decrease of 77.4 percent since December 2011): page 11
  • Spammers continue to take advantage of holidays and events: page 2
  • Best Practices for Enterprises and Users: page 14


  • ...
Symantec Analyst Relations | 25 Jan 2012 | 0 comments

Continuing his video blog, Symantec’s EMEA CTO, Darren Thomson talks about Virtualization in this three minute video and some of the reasons why customers are doing this.  Cost savings, agility, consolidation and a step towards the cloud are discussed along with Symantec’s view across the areas of risk such as: storage, data protection, HA/DR, security and virtual desktop.

Watch the video here

GregDay-SecurityCTO | 04 Jan 2012 | 0 comments

While it may not be the answer to everything, desktop virtualization offers a good solution for certain usage models, such as where access needs to be restricted to certain information or services, or where desktop management needs to be centralized. In the model, virtual instances of desktops send display information to remote screens, even though the processing is actually taking place on a server.

The model can put strains on the physical IT architecture, however. To avoid bottlenecks, it helps to have an understanding of what's going on in the underlying server, storage and network environment. As well as visibility on what’s running on each virtual machine, and how much resource it is consuming.

This brings us to desktop antivirus software which, like any other package, is going to be contending for processing cycles. With the best will in the world, if a hundred virtual desktops are running on the same server and accessing the same storage, and each...

Symantec Analyst Relations | 04 Jan 2012 | 0 comments

The concept of cloud brokering had been drawing more attention lately. In particular, Gartner has developed quite a bit of market analysis on the topic. Most of these analyses tend to focus on the business of cloud brokering. However, I find it insightful to consider the potential technology platforms associated with cloud brokering.

Very often, the largest and most durable technology businesses are strongly intertwined with differentiated, scalable, hard to replicate technology platforms (i.e. databases, operating systems, search engines) By nature, these platforms provide a long-term sustaining competitive advantage. Furthermore, when it comes to corporate strategic investment or VC funding, the ability to articulate breakout platform opportunities can prove invaluable. Platform envy can significantly increase investors...

Symantec Analyst Relations | 19 Dec 2011 | 0 comments

Blog by Robert Mol, Director Product Marketing EMEA:

About a week ago I hosted an Executive Round Table on Consumerization of IT. Just outside the city of Brussels, Belgium a group of Enterprise customers from a variety of industries gathered for what can only be described as a Round Table with gastronomic excellence. After a gracious opening by our host and a last sip of the finest bubbly, my focus turned to discovering the perception of our guests on the Mobile Solutions and Services market. My primary question? Do they recognize the same explosive and disruptive change in the adoption of Mobile devices as presented by the analyst community and what are their key concerns? With representation from the Finance sector, Healthcare, Government, and Media,  this was looking to become a lively afternoon with likely very different perceptions amongst these senior IT leaders.

Read more here: ...