Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Symantec Analyst Relations | 18 Aug 2014 | 0 comments

The original blog is posted on Information Unleashed.

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.

With that in mind, we at Norton are making significant changes to simplify and strengthen our portfolio of security products. We are making it easier to select and buy the security products you need, and download and maintain them. As cybercriminals...

Arnaud_Taddei | 18 Aug 2014 | 1 comment

In data centres across the world the principles of server virtualisation, and their impact on how server resources can be allocated, managed and secured, have been established over the past decade and are now part of mainstream IT. 

While similar ideas have taken some time to infiltrate into the logical and physical architectures of our communications networks, they are now reaching the mainstream - in the shape of Network Function Virtualisation (NFV) and Software Defined Networking (SDN). 

The former (NFV) enables an opening up of networking functionality, while the latter (SDN) speaks to the ability to orchestrate and control networking functions as a result. Together, they separate the control plane from the networking layer, enabling networks to be created more flexibly than was possible in the hardware-defined days of ‘big iron’. 

In addition, they present the opportunity to create closer, more...

Darren Argyle | 11 Aug 2014 | 0 comments

Of all the types of security threat faced by businesses today, perhaps the most ominous are 'zero-day attacks’, so-called because when they strike, no known or comprehensive solution exists to counter the vulnerabilities they exploit. As such, time is not going to be on the target organisation’s side. With such a dramatic rise in such attacks, chances are something will get through, so it's no longer a question of 'if', its 'when', so how can you reduce the risk and limit the impact.

So how can organisations best set itself up to mitigate the risk against such attacks? We believe the answer is to consider them in terms of our four pillars of security protection: planning and preparation, prevention, detection and response, recovery and resolution. Let’s take a look at how these apply, across the stages of a zero-day attack.

First, even if the exact scope and scale of an attack isn’t known about in advance, its chances of success can still be...

Caroline Dennington | 28 Jul 2014 | 0 comments

Symantec is in transition and so, too, are the problems that customers are asking us to solve. We believe that the time to simplify and integrate one of the industry’s broadest portfolios is now, refocusing on what’s needed most, in order to fulfil those customers’ widely diverse and ever-expanding expectations.

That is a role we are more than happy to take on at Symantec, especially as more and more organisations are telling us that what they want, most of all, is a trusted IT advisor that can help them seize new opportunities, reduce risk and cost, and ensure that services and data are available, resilient and compliant. In other words, they want a simpler way to grow their business – and a partner to keep their systems and people safe on that journey.

Go_CMYK_0_0.jpgSymantec has been making important changes over the last 18 months  that will help us better serve our customer’s...

Caroline Dennington | 22 Jul 2014 | 0 comments

The recent visit of several industry analysts in Symantec's UK office created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information Fabric Platform that underpins this strategy.

Paul Dominjon, Symantec's Senior Product Marketing Manager, pointed out that customers are moving increasingly to a virtual environment, while many business-critical applications remain on physical servers. At the same time, our customers often have operations that have grown through mergers and acquisitions with up to two to three backup solutions in play and little or no integration. “The upshot of this is that customers are simply too busy to rationalize, consolidate and simplify their technology and licenses,” said Dominjon.

Whatever the customer infrastructure, Symantec's role is to support our customers and the wider business community through our redefined Unified Information Management Strategy, delivering a platform...

Symantec Analyst Relations | 21 Jul 2014 | 0 comments

Vision Channel Day, 8th July 2014 | Vision Symposium, 9th July 2014

In 2014, Symantec is creating a multi-day, flagship event, Vision Las Vegas, which will kick off a series of two-day events in cities throughout Europe, Asia, and South America.

Vision Symposium 2014 will feature deeper insights into Symantec´s strategy, more big announcements, and unprecedented exposure to upcoming Symantec solutions - all tailored for businesses and IT professionals at every level.


Please see below for highlights from the Symantec Vision Channel Day and Vision Symposium in Munich.

Keynote Part 1: Stefan Henke, Country Manager, Germany and Frank Thonüs, Regional Director, EMEA PACSS Region and others

Keynote Part 2:...

Drew Meyer | 17 Jul 2014 | 0 comments

Symantec’s unified vision and new array of solutions around its Information Management (IM) offering are propelling customers towards ever greater agility, freedom of choice and the highest levels of security in what is becoming an increasingly complex and disparate IT environment for organizations everywhere.

That was the good news we were able to deliver at a recent webinar for the APJ region where industry analysts gathered to hear how environments spanning both physical and virtual can be better managed using our IM solutions. What we were able to tell everyone was exactly how we are now able to reduce those complexity issues they face every day, supporting our customers as they perform crucial functions around archiving, data protection and backup, and data recovery.

In a world where the move into the cloud is accelerating – public, private and hybrid –customers want to leverage all the advantages this may offer by having the flexibility of running any operating...

Sian John | 15 Jul 2014 | 0 comments

An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.
This question becomes increasingly important when considering software-defined networking (SDN) or more specifically, what happens as the creation of virtual machines becomes increasingly automated?
As use of SDN increases, so it becomes more important to ensure all security features are enabled - such as intrusion protection, firewall and behavioural monitoring - not just antivirus.
This is primarily because it may not always be obvious how and where a VM is to be used, and therefore how well protected it needs to be. However it is not so straightforward to run some features 'off-VM' - for example behavioural monitoring requires direct access to system resources.
Equally there are times when it makes more sense to run...

Paul Wood | 14 Jul 2014 | 0 comments

Trends are complicated things. Consider, for example, the threat often called Ransomware. In our annual Internet Security Threat Report, all signs were that it was following a steady growth path which would continue into 2014. However, more up to date intelligence (as documented in our May 2014 Intelligence Report) suggests otherwise. It remains to be seen if the threat is cyclic, so we shall continue to watch with interest.

So, what gives? To understand Ransomware, we need first to understand how and why it emerged. Before Ransomware another form of extortion was prevalent, called Fake Antivirus (Fake-AV, or rogue security software). This would find its way onto a victim’s computer through email, website drive-by or other means, and then...

Symantec Analyst Relations | 01 Jul 2014 | 0 comments

Customers, partners and analysts gathered together to hear the latest on Symantec’s unified vision for its security portfolio and insights on the company’s new Managed Security Services – Advanced Threat Protection (MSS – ATP).

Held at the Raffles Convention Centre, the Singapore Symantec Security Symposium began with Country Director Yuh Woei Tan’s opening note that set the theme of the event – “Proactive. Practical. Trusted Security”– in place. The theme was also echoed by Sean Doherty, Vice President of Technical Strategy & Operations, whose keynote on Symantec Unified Security homed in on the billions of attacks that are happening to our customers each year. In an environment where breaches are inevitable and information is everywhere...