Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with Mobile
Showing posts in English
Symantec Analyst Relations | 28 Nov 2012 | 0 comments

by John Brigden, SVP EMEA

This blog was originally posted in Information Unleashed.

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the culprit in more than one-...

GregDay-SecurityCTO | 22 Aug 2012 | 0 comments

There is often talk of the growth in mobile threats and, in 2011, we saw significant growth, in terms of volume as a percentage. Yet, as a total of the numbers involved, these were still relatively small – in the thousands, rather than hundreds of millions that unleashed themselves on the PC last year.

At the same time, we did see far greater innovation in the nature of mobile threats, with attackers focusing in on finding vulnerabilities to exploit, such as the botnet concept, as well as where money can be made and information stolen through smart devices.

So what is the right way to manage that threat and soften its impact?

Let me start by looking at process – and please bear with me as I do. In the past 10 years, the cost of a laptop computer has plunged by a massive 90%, while already it’s...

Symantec Analyst Relations | 25 Jul 2012 | 0 comments

"Sometimes I like to think of Symantec as an elephant," said Angela Tucci, Symantec’s chief strategy officer, over lunch at London’s Soho Hotel. "Depending on which side of the elephant you look at," she explained, "you get a completely different perspective of the creature."

Read the following interview with Angela Tucci, Chief Strategy Officer at Symantec on her views around Mobile, Cloud, Virtualization, strategic acquisitions and rebranding Symantec here

Marie Pettersson | 15 Jun 2012 | 1 comment

A few weeks ago I hosted a banking sector CIO Roundtable on the topic of mobile technologies and their impact, both inside the enterprise and in how banks engage with their customers. Of particular interest was the whole area of mobile payments - not least because there still appears to be so much to play for in this still-developing area. We've seen some fantastic success stories in both developed countries and developing nations, where mobile payments are fast be coming the 'de facto' mechanism for currency transfers (but not necessarily with a bank behind it). In western economies, the opportunity for banks is to provide better services than the competition, increasing customer satisfaction and encouraging upgrades to enhanced facilities. 

Mobile banking is not without its challenges, however. It is easy to think that smartphones are where the action is, yet many banking customers still have simpler phones with SMS alone. Equally however, the mobile...

D Thomson | 31 May 2012 | 0 comments

Some of the reticence around using “the Cloud” seems to have come from the question of whether it can be trusted – particularly when it comes to managing corporate data. Cloud has its risks, just like any architecture or approach, which need to be weighed up against the risks of running things in-house. 

I think there is a bigger question however, which goes beyond mere risk. Cloud computing came into existence as part of a natural progression in how we use technology resources. But this goes far wider than merely cloud. Two additional factors illustrate the broader landscape, namely how we are becoming more mobile, and how people are increasingly making their own technology decisions. 

This is not the moment to delve into these parallel trends, respectively nicknamed mobility and consumerisation. The point is that they are inextricably linked, and internet-based technology service delivery – aka cloud computing – is another...

Brad | 17 May 2012 | 0 comments

I don’t need to repeat what my esteemed colleagues have already been sayingabout the mobility-related announcements we made at Symantec Vision this year. However, it is worth picking up on some of the context – not least about how organizations are dealing with the challenges.

Earlier this year we released the results of a global survey into enterprise mobility. From the 6000-plus responses, most findings corroborated what we have been hearing from our own customers. Notably that mobile technologies do make it easier, more efficient and effective, to do business – even though they create new challenges which need to be addressed.

Indeed, 41% of respondents placed mobile computing at the top of the pile of technology-...

Symantec Analyst Relations | 14 May 2012 | 0 comments

Cross-posted from Symantec Security Response blog

Join Symantec security experts on Twitter (using the #ISTR hashtag) on Tuesday, May 15, at 10 a.m. PT / 1 p.m. ET to chat about the key trends highlighted in Symantec’s recently released Internet Security Threat Report, Volume 17.

This year’s report, which covers the major threat trends observed by Symantec in 2011, highlights several troubling developments. For example:

  • Symantec blocked more than 5.5 billion malicious attacks in 2011, an increase of 81 percent over the previous year.
  • The number of unique malware variants increased to 403 million and the number of Web attacks blocked per day increased by 36 percent.
  • Targeted attacks are growing,...
Symantec Analyst Relations | 30 Apr 2012 | 0 comments

Symantec’s Internet Security Threat Report showcases the threat landscape in 2011, highlighting that the number of malware attacks increased by 81 percent. Read the report to get the latest on key trends including advanced targeted attacks that are expanding to focus on organizations of all sizes, increased data breaches, and a continued focus on mobile threats by attackers.

Additional resources

Multimedia:

Marie Pettersson | 05 Apr 2012 | 0 comments

Consumerisation is nothing new. When personal computers first arrived (together with office and database software from companies like Lotus, WordPerfect and Microsoft) they enabled people with a bit of money to equip their home offices in much the same way as their workplaces. The key phrase here is, "with a bit of money," as the earliest adopters of home technology were frequently the more senior corporate staff. With a simple floppy disk drive providing the connection between home and work, executives were quickly impressing each other with their database prowess or skill in creating presentations. Roll forward a few decades and technology has become a lot more accessible and affordable.

These days we use the term 'consumerisation' to talk about smartphones and 'apps', use of online collaboration and storage, and indeed, having computers and printers at home that are often more powerful or functional than corporate-supplied kit. The...

Symantec Analyst Relations | 19 Dec 2011 | 0 comments

Blog by Robert Mol, Director Product Marketing EMEA:

About a week ago I hosted an Executive Round Table on Consumerization of IT. Just outside the city of Brussels, Belgium a group of Enterprise customers from a variety of industries gathered for what can only be described as a Round Table with gastronomic excellence. After a gracious opening by our host and a last sip of the finest bubbly, my focus turned to discovering the perception of our guests on the Mobile Solutions and Services market. My primary question? Do they recognize the same explosive and disruptive change in the adoption of Mobile devices as presented by the analyst community and what are their key concerns? With representation from the Finance sector, Healthcare, Government, and Media,  this was looking to become a lively afternoon with likely very different perceptions amongst these senior IT leaders.

Read more here: ...