Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
James Hanlon | 20 May 2014 | 0 comments

For enterprises, these are testing times in the extreme. Never have IT departments – and the businesses that they support – been more exposed than they are today.

IT departments are challenged at every turn – with pressure from business leaders asking “is the business safe from cyber attacks?”; rapidly evolving IT estate complexity, including mobile rollouts, new cloud deployments and emerging software-defined data centres. IT relies heavily on its security teams, who are left to deal with disconnected security architectures and struggle with underfunding, and often a lack of incident investigation resources to be able to deal effectively with the waves of security incidents.

The thing is that attackers know this and are constantly seeking to extend their reach into the very fabric of the IT operations. As a result, many organisations are left vulnerable and at risk.

And it’s the nature of the attacks that are causing most consternation. Today’s...

Mark Nutt | 19 May 2014 | 0 comments

They are young, bright, vibrant, talented and the task they have been handed is a daunting one: pitting their wits against an enemy that is growing rapidly in number, sophistication and daring -– an enemy that operates unseen in the dark areas of the Internet, from right across the globe. They are the formidable Cyber Threat Operations team put together by professional services firm PwC to take on the cyber criminals.

The dynamic of a ‘boots on the ground’ incident response team at PwC, under their leader Kris McConkey, 32, conjures up an exciting image of a crack squad, battling against the cyber underworld. The reality may often be more prosaic, but there’s no denying the significance of the task that these cyber crime fighters have taken on as they track down the perpetrators. These increasingly sophisticated and highly organised groups of assailants are now rapidly becoming a threat to businesses everywhere.

Kris’ team is part of a large and rapidly growing Cyber...

James Hanlon | 15 May 2014 | 0 comments

Cyber security incidents happen every day. They have become inseparable from our everyday business lives. Some you will be able to identify and deal with easily, with no significant damage. Others have the potential to severely disrupt and damage your operations.

However much we may wish there was a silver bullet that could target and eliminate such threats, it isn’t going to happen. The reality is that cyber threats and attacks are here to stay, growing in sophistication and frequency, with no one outside of, or safe from, their reach.

Rather than hoping an attacker might bypass your business (everyone is a potential target in this cyber-connected world), you need to have a Cyber Resilience Strategy firmly in place to protect you. That means identifying the important incidents, and ensuring the business remains effective and up and running throughout any attack. But what does ‘effective’ mean in this case? It means having deep visibility across an organisation into...

Kenneth Schneider | 02 May 2014 | 0 comments

We live in an emerging digital industrial economy… where cloud and mobility are driving demand to secure and manage a new flood of data…. where voice, video and the Internet of Things are transforming how we function… and where businesses are challenged to protect both their intellectual property and their customers’ information.

Information is the lifeblood of this economy and it is becoming ever more mobile. Information now flows from cloud platforms to mobile apps, and from enterprises’ data centers to their business partners in ever changing ecosystems.

And the information landscape just gets more complex, from both a compliance and security perspective, as companies go global and continue to move from ‘Information Here’ in glasshouse data centers to hyper-distributed ‘Information Everywhere’. The opportunity to leverage and analyze information is increasing quickly. But the challenge to protect that information is growing as well.

Information needs to be...

Paul Wood | 08 Apr 2014 | 0 comments

In security as in business, information is power. As we put together the latest edition of the Internet Security Threat Report, we wanted to do more than simply throw some figures out there. As a result, Volume 19 presents a comprehensive analysis of last year’s threats according to publicly available information and events within Symantec’s purview, as well as detailed guidance about what security professionals can do in response. 

At the top level of the report, the main finding was a rapid and significant increase in breaches leading to the exposure of individual identities - employee, customer and patient details. Overall a total of 552 million identities were exposed, across 253 significant security breaches. 

Just as significantly, many of these breaches took place in the final quarter of the year, suggesting that we are at the beginning of a slew of such attacks - one of the reasons we felt pressed to include detailed advice in...

msmart007 | 02 Apr 2014 | 1 comment

Microsoft’s decision to switch off all support for Windows XP, some dozen years after it first made its entrance, is a momentous one. Those who have doggedly stuck by this much loved operating system, failing to be enticed into the arms of Vista, Windows 7 and Windows 8, will receive no further free updates or security patches (as of April 8, 2014).  

Lots of software goes down the end-of-life path, of course, and disappears into the mists, to be replaced by the latest updates. But, to paraphrase a major retailer’s advertising slogan, ‘This is no ordinary software. This is XP software’ – an OS that, by latest calculations, is still run by something like a quarter to one-third of desktops globally. And waiting in the dark corners for the plug to be pulled have been the cyber criminals, ready to leap in and exploit the situation. In fact, they...

D Thomson | 27 Mar 2014 | 0 comments

I believe that the IT industry will, in the future, hold far more responsibility for radical changes to culture and society than ever before. The Internet of Things (IoT) will see humanity take a new foundation on which to build things (the Internet) and start to create architectures and services that fundamentally change the way we live our lives. Just in the past few weeks, I have spoken to entrepreneurs and large businesses that are seeding technological concepts that could, eventually, touch all of us in very meaningful and real ways. It is difficult (especially for a technologist like me) not to get excited about self-driving cars that learn from each other, connected homes that allow us to remotely monitor and control our personal spaces and smart meters that have a profound impact on a nations energy consumption. But, as I have discussed before, there are likely to be unintended consequences to all of these ideas that technologists (even the really clever ones) are likely to...

Straners | 26 Mar 2014 | 0 comments

I’ve been thinking about data a lot recently. Nothing unusual there - it’s my job after all, and given the way data is growing at the moment, the term ‘big data’ is a regular on the daily buzzword bingo card. What’s really been making me think however, is not so much the quantities of data, but where it all is and how we can access it. 

The volumes of data being stored in online media sites such as YouTube or Vimeo, the blogs, content and status updates across social networks, the events and transactional traffic being generated by advertisers and devices are all creating an online pool that is dwarfing the overall volumes being stored inside corporate data centres. 

Such resources present a rich seam, which is increasingly available to be mined, as examples such as Amazon providing access to “Open datasets” via EC2 illustrate. Add to this the vast pools of governmental data - across transport and other public services - being opened up...

tgrandpre | 17 Mar 2014 | 0 comments

Mobile World Congress was an exciting time for Symantec this year, with so much constructive engagement taking place with many of you from the analyst community, particularly around the key areas of Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Security and Enterprise File Synchronization and Sharing (EFSS).

From my conversations with you, what really seemed to catch your attention were the advances we’ve been making in mobile as a whole. The overall integration between MDM and MAM – and broader solutions that enhance our mobile offerings – many of you agreed were taking things in a new direction.

Most of you seemed more than familiar with Norton Zone already, but it might be worth a quick recap here. Norton Zone is our secure sync and file technology – a personal cloud service that lets users safely share files from your computer, smartphone and tablet. Many of our...

msmart007 | 06 Mar 2014 | 0 comments

Cyber attacks are headline news everywhere we look, highlighting companies that have been brought to their knees by such assaults, while independent organisations like the World Economic Forum and Lloyds are publishing business risk registers where Cyber Risk is now in the top 10 (Lloyds Risk Register has it at number 3).

It’s this type of daily bombardment that is putting Cyber top of mind. This is a good thing. Because, if that gets the attention of businesses and has them rushing to respond, then at least those horror stories are serving a useful purpose. But sometimes it’s hard to respond to requests from the board to demonstrate the value that IT brings or to articulate your organisation’s Cyber Risk posture in the language that business understands. At the same time, loading up your systems with technology that’s designed to keep the cyber criminals out is not the solution. Nor is the assumption that IT can keep your business safe the best way forward. Because, no...