Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
FranRosch | 06 Oct 2014 | 0 comments

Security is deeply personal. Every day, we see examples of private information being exposed or exploited. At Symantec, we want to give people confidence – whether they’re sharing photos or shopping from a smartphone – that we are working constantly behind the scenes to keep their information protected.

So, in a move to streamline nine core offerings into one easy-to-use flagship subscription service, Symantec has announced the availability of Norton Security. The new service is an advanced multi-layered protection solution that helps shield consumers from sophisticated and evolving threats across all platforms. Norton Security is also available with integrated backup capability to help ensure photos, address books and important files don’t get lost.

According to...

tgrandpre | 03 Oct 2014 | 0 comments

Symantec Mobility: Suite 5.0 is almost here – building on our commitment to a new strategy, unveiled with the release of 4.0, to streamline and simplify the solution, so it can deliver significantly improved performance for customers and partners. The SaaS version is already out, with On-Premise scheduled for early October.

Symantec Mobility Suite 5.0 will:

  • Offer a single console with flexible, modular packaging
  • Improve the user experience (streamlined tasks and enrollment)
  • Support Windows Phone 8.1, Samsung SAFE, and Apple iOS 8.
  • Simplify Android device enrollment

Why does 5.0 matter so much? Because it is the most significant release to date for mobile management. While mobility offers ‘any device, any time, any place’ productivity, appealing to both enterprises and employees, that same flexibility comes with challenges – protecting corporate data on devices, separating personal and corporate information, managing...

msmart007 | 01 Oct 2014 | 0 comments

A question that comes up increasingly in our constantly changing world of security is: “How does data centre security differ from network and end-point security?”

There are a number of fundamental differences and it’s worth taking a look at some of these. For example, when it comes to the data centre, there are more constrains on security, in terms of performance – i.e., not standing in the way of innovation. In fact, performance becomes a real issue, because of the speed of change and innovation, but also in terms of the performance of the systems and applications that are running; especially as security can slow down applications and reduce capacity.

Another point to bear in mind is that the attack surface is about much more than simply the host. People don't necessarily think about applications running within the host, network devices (such as storage) and the user. That's where we will see real change in people operating the data centre, with customers often...

shankar_somasundaram | 30 Sep 2014 | 0 comments

Symantec is investing in the Internet of Things (IoT) – with different verticals like automotive, healthcare, industrial control systems, retail, being key areas of focus. And the reason isn’t hard to understand: IoT – connecting machines and devices together into functioning, intelligent systems – is a big, growing and diverse landscape that has permeated the industry at an astonishing rate and opened up vast opportunities, enabling unparalleled levels of automation and supply chain efficiencies.

Take industrial control systems (ICS), for example: they are now being connected to the Internet on a massive scale, with IoT bringing even greater acceleration of connectivity, not only in the production process and supply chain, but also right across all business processes. Organizations are increasingly embracing these innovations and moving towards improved interconnectivity, in the drive to be more globally competitive and gain a greater foothold in their market sectors.

...
Symantec Analyst Relations | 25 Sep 2014 | 0 comments

Originally posted in Security Response

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X (which is based around Unix). Known as the “Bash Bug” or “Shellshock,” the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.

The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and Unix. Bash acts as a command language interpreter. In other words, it allows the user to type commands into a simple text-based window, which the operating system will then run.

Bash can also be used to run commands passed to it by applications and it is this feature that the vulnerability affects. One type of command that...

Ilias Chantzos | 19 Aug 2014 | 0 comments

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally used to refer to all automated or computerised systems, in terms of both hardware and software – because cyber is the horizontal element that underpins economic life.

With globalisation enabled by transport technology, communications technology and global markets, and cyber used so widely within the economy and our personal lives, its reach extends deep into the political landscape. Cyber runs our economy, it can be used to reach large amounts of the population, for committing crime, be weaponised and it affects national security – and therefore the state – at its core. All of which means that it has a direct impact on public interest and therefore attracts political attention.

UK...

Symantec Analyst Relations | 19 Aug 2014 | 0 comments

The original blog is posted on Information Unleashed.

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.

With that in mind, we at Norton are making significant changes to simplify and strengthen our portfolio of security products. We are making it easier to select and buy the security products you need, and download and maintain them. As cybercriminals...

Arnaud_Taddei | 18 Aug 2014 | 1 comment

In data centres across the world the principles of server virtualisation, and their impact on how server resources can be allocated, managed and secured, have been established over the past decade and are now part of mainstream IT. 

While similar ideas have taken some time to infiltrate into the logical and physical architectures of our communications networks, they are now reaching the mainstream - in the shape of Network Function Virtualisation (NFV) and Software Defined Networking (SDN). 

The former (NFV) enables an opening up of networking functionality, while the latter (SDN) speaks to the ability to orchestrate and control networking functions as a result. Together, they separate the control plane from the networking layer, enabling networks to be created more flexibly than was possible in the hardware-defined days of ‘big iron’. 

In addition, they present the opportunity to create closer, more...

Darren Argyle | 11 Aug 2014 | 0 comments

Of all the types of security threat faced by businesses today, perhaps the most ominous are 'zero-day attacks’, so-called because when they strike, no known or comprehensive solution exists to counter the vulnerabilities they exploit. As such, time is not going to be on the target organisation’s side. With such a dramatic rise in such attacks, chances are something will get through, so it's no longer a question of 'if', its 'when', so how can you reduce the risk and limit the impact.

So how can organisations best set itself up to mitigate the risk against such attacks? We believe the answer is to consider them in terms of our four pillars of security protection: planning and preparation, prevention, detection and response, recovery and resolution. Let’s take a look at how these apply, across the stages of a zero-day attack.

First, even if the exact scope and scale of an attack isn’t known about in advance, its chances of success can still be...

Caroline Dennington | 28 Jul 2014 | 0 comments

Symantec is in transition and so, too, are the problems that customers are asking us to solve. We believe that the time to simplify and integrate one of the industry’s broadest portfolios is now, refocusing on what’s needed most, in order to fulfil those customers’ widely diverse and ever-expanding expectations.

That is a role we are more than happy to take on at Symantec, especially as more and more organisations are telling us that what they want, most of all, is a trusted IT advisor that can help them seize new opportunities, reduce risk and cost, and ensure that services and data are available, resilient and compliant. In other words, they want a simpler way to grow their business – and a partner to keep their systems and people safe on that journey.

Go_CMYK_0_0.jpgSymantec has been making important changes over the last 18 months  that will help us better serve our customer’s...