Video Screencast Help
Symantec Analyst Relations
Showing posts in English
D Thomson | 02 Aug 2012 | 0 comments

As discussed in previous blogs the topic of the “information explosion” seems to be top of mind for many IT execs today (unstructured data being the chief protagonist responsible for data growth in most companies). Many IT organisations have, until now, relied on the collapsing cost of storage as a risk mitigation technique & “band-aid” strategy (“well,  disks are no longer costing what they used to so we just broker very cheap deals and add racks to the datacentre”)..

This somewhat tactical and short-sighted approach has its obvious short-comings.. For one, 2002 was the last year in which disk price performance kept up with information growth. Secondly, all this “cheap” disk needs somewhere to live (and it needs to be cooled, powered, administered…).

It is predicted that the growth of data will be 800%, with 80% unstructured data in the next 5 years. While enterprise data is growing at a rate of 40% to...

Symantec Analyst Relations | 25 Jul 2012 | 0 comments

"Sometimes I like to think of Symantec as an elephant," said Angela Tucci, Symantec’s chief strategy officer, over lunch at London’s Soho Hotel. "Depending on which side of the elephant you look at," she explained, "you get a completely different perspective of the creature."

Read the following interview with Angela Tucci, Chief Strategy Officer at Symantec on her views around Mobile, Cloud, Virtualization, strategic acquisitions and rebranding Symantec here

Neal Watkins | 22 Jul 2012 | 0 comments

St. Paul’s Cathedral has dominated the London skyline for more than 300 years, while almost everything around it has changed. From the street to the Shard, the traffic to the tourists, it’s all new, while the Cathedral has stayed the same. The same is true of the data that dominates our lives.

Although you might think data is constantly changing, it remains the one invariable in a dynamic IT landscape. Anyone the wrong side of 40 will remember the different eras of IT. First we had the mainframe period, then the dawn of the PC, followed by the brief, bright light of client/server computing. Next came the Internet and collaborative computing. Throughout the last 30 years, the bedrock of all those eras has been data. Yes, there’s more of it—unstoppable amounts in fact—but it’s always been there, always needed to be protected, secured, and kept available.

Right now, we’re in the post-PC era, where everything is Cloud-enabled, and...

GregDay-SecurityCTO | 18 Jul 2012 | 0 comments

While the BBC recently reported the existence of Shodan, a searchable online database of Internet-connected control devices, the fact is that the site has been around for a couple of years now. Shodan holds information about every type of system from standalone computers to industrial scale equipment controllers, such as the Dutch canal control system mentioned on the BBC report.

Shodan isn't the only kid on the block. The "Every Routable IP Project" (ERIPP) aims to build a database of every internet-accessible device - a seemingly innocuous goal. While the existence of such search engines may not be 'new' news, it is certainly worth broadcasting the fact they are still seen as relevant as they offer a shockingly useful resource. With relatively little experience or...

D Thomson | 13 Jul 2012 | 0 comments

The industry is buzzing right now with talk of “the information explosion”. In talking to customers and digging a little deeper, it seems that the trend of unmanageable and extreme data growth is largely the fault of “unstructured data” (email, video, social media, backups, powerpoint are all cited regularly is chief culprits).

Whilst an exponential growth in data and the storage devices necessary to store it are clearly in need of revised and sometimes disruptive new approaches, I can’t help but think that a “back to basics” philosophy might also be appropriate in many cases.. You remember, good old-fashioned IT service management discipline that we were told years ago would bring our IT shops into line (and that most of us never quite got around to implementing).

On recent visits to our customers and in discussing their current storage and “information explosion” nightmares, we have (in almost every case) needed...

Symantec Analyst Relations | 12 Jul 2012 | 0 comments

By John Brigden, Senior Vice President, EMEA

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

The dramatic news that one of the U.K.’s leading financial services organisations had suffered a data outage that led to millions of customers unable to access their accounts should be a wake-up call for every CIO. The event tells them that their operation is entirely dependent on IT and in particular on the IT resources they have to run their systems.

Read the blog here

khaley | 11 Jul 2012 | 0 comments

 

The furious discussion about the appropriateness of the term Advanced Persistent Threats (APTs) has finally died down and many people are now gun shy about using it. I’m okay with that.  I completely agree that the phrase was overused and over applied. But that doesn’t mean we should bury the term.  First we should properly define it.  Symantec has done that here.  Next, I’m going to go out on a limb and actually praise the use of the term APT.

So what’s to praise about the term APT?  Two things.  First, it was an extremely effect way of getting the attention of people who have for years been ignoring the risk of targeted attacks.  We were able to advance the conversation and get companies out of the mind-set that targeted attacks were something that happened to other people.  If you’re one of the ones that still need proof take a look at the data we...

GregDay-SecurityCTO | 10 Jul 2012 | 0 comments

Attacks by viruses, trojans and other malware have often been considered as a Microsoft problem. Whilst Microsoft may have initially been slow to realise the significance and impact of malware, with  Windows XP Service Pack 2 and Microsoft’s Trustworthy Computing initiative, led by a former FBI agent, that the company started to get on top of the challenge.

Despite what the anti-Redmond crowd have blogged over the years, however, hackers didn’t target Microsoft products exclusively because they were insecure, or because the people involved had some ideological death-wish on the company. No – they did it because Microsoft was the most used end-point device environment in the world. Bill Gates’ “Windows Everywhere” ambition, once realised, made it the most obvious of all targets.

When times change, however, they don’t necessarily follow the script. In the personal computer era, the debate was about whether Linux (and more...

Orla Cox | 04 Jul 2012 | 0 comments

Much has already been written about the ongoing analysis into the code, sources and likely consequences of the 'Flame' or 'Flamer' malware program. Even at this early stage however, there's one aspect that continues to set it apart: its complexity.

W32.Flamer, to give the malware its technical name, is over 20MB in size - which makes it an order of magnitude bigger than its contemporaries. Our analysis to date has revealed that it contains a number of self-contained modules including screen capture, database management, Bluetooth, secure transmission and even self-destruct capabilities.

While its role as a targeted espionage tool is already evident, some purposes of this particular piece of malware are still to become clear.  It appears extremely well...

Symantec Analyst Relations | 26 Jun 2012 | 0 comments

By Francis deSouza, Group President, Enterprise Products and Services

This blog was originally posted in Information Unleashed: The Official Voice of Symantec

With every ring of its cash registers, Tesco is getting smarter. Each month the company collects billions of pieces of information on its customers’ shopping habits and uses them to adjust its promotions and pricing, giving the company a huge competitive advantage. In essence, this British retail giant is harnessing the power of data analytics in order to help put the “I” back in Information Technology.

And Tesco is not alone. From confidential customer data to intellectual property to financial transactions, organizations possess massive amounts of information that not only enable them to be productive and competitive, but also grow their business.  In fact,...