Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Carey Nachenberg | 21 Nov 2013 | 0 comments

This blog will discuss a vision for ‘to-be state’ of enterprise security and targeted attack protection, and is the last part of this blog series.

In my last blog, I detailed the first step toward achieving our vision for enterprise security. To summarize, I proposed that we need to update our existing security products so they generate a steady flow of security-relevant telemetry (e.g., every login, failed or not, between every machine in the enterprise, metadata for every inbound email, every connection through the firewall, etc.) – even when that telemetry doesn’t appear directly related to an in-progress attack at the time it’s collected. This telemetry will be used in two...

Carey Nachenberg | 14 Nov 2013 | 0 comments

In my previous blog I talked about the as-is state of enterprise security. Now I’d like to paint a picture of a much better future state that I believe is achievable, and then I’ll tell you how we can make that state a reality.

First, in our ideal future state attackers don’t just go away, and let’s be honest, regardless of how advanced our defenses become, attackers will still find a way to penetrate them. So in our future state, we will not totally eliminate compromises – they will occur. However, we envision a future state where enterprises will either block the attacks outright, or discover them within minutes or hours of compromise, rather than the months or years it takes to detect many attacks today.  We further envision a future state where enterprises won’t need an expensive team of security experts or large numbers of proprietary integrations to achieve this level of protection. We envision a state where the...

D Thomson | 12 Nov 2013 | 0 comments

Over the past few weeks my colleagues and I had the opportunity to meet with many of you and even attend some of the industry events including analyst conferences. I felt the need to blog today, however, based on the level of excitement that I have been picking from my Symantec colleagues “I think we got it right…”, “At last, it feels like we are ahead of the curve…”, “It’s nice hearing that all of our efforts are aligned to where the industry is going..”.

What are my colleagues referring to? The Symantec 4.0 strategy and, more specifically, the almost spooky similarities between its intended outcomes and the trends in the market that you, the industry analysts, are telling us to watch.

Below I have highlighted some of the “Trends To Watch” and aligned them to some of the things we at Symantec are doing...

Carey Nachenberg | 07 Nov 2013 | 0 comments

Greetings, analysts!

My name is Carey Nachenberg and I’m a Symantec Fellow and Vice President in our CTO organization.  I’ve been with Symantec a whopping 23 years (if you count both my internships and full-time employment at the company) and have seen the company go through many changes over the years. However, I believe that the biggest changes are yet to come. 

Over the past two years, I’ve been working with technical leaders around the company on a new vision for the future of cyber-security – a vision that will finally address the targeted threat challenge, and one that promises to fundamentally change the way corporations implement and manage their security. Now that we have reached clarity on this vision, I’d like to share it with you in this three-part blog. 

I look forward your candid feedback and thoughts.

Part 1: The As-...

D Thomson | 28 Oct 2013 | 0 comments

In preparation for creating our Symantec 4.0 strategy, we took the step of listening to our customers. What company would ever say they didn't? By listening I mean really listening - we sat down with customers, individually and in groups, and asked what worked and what didn't, what they liked about Symantec and what they felt needed to change. 

We travelled the globe to take the views of companies large and small, from the widest variety of sectors. So, what did we hear? As we distilled down the notes taken from interviews and workshops, email exchanges and calls, we found that the essence could be summarised in two words: simplicity and integration.

So, first, simplicity. Of course enterprise organisations want to keep things simple - but technology today is increasingly complicated. Cloud services and consumerisation, mobility and remote working making it ever harder to manage information and mitigate risks. At the...

Philip Routley | 24 Oct 2013 | 0 comments

I always like to start with the good news. So, according to the findings of the 2013 Norton Report, the number of online adults who have experienced cybercrime has decreased. Time to celebrate? Not quite. Because the average cost per victim has risen by a staggering 50 per cent.

And it’s all down to a change of tactics on the part of the cybercriminals, who are now using far more sophisticated attacks, such as ransomware and spear-phishing, where the financial yield per attack is higher than ever before. As Symantec’s chief technology officer Stephen Trilling rightly points out to the unwary. “With the findings from the Norton Report that 49% of consumers use their personal mobile device for both work and play, this creates entirely new security risks for enterprises, as cybercriminals have the potential to access even more valuable information.”

SLEEPING WITH THE ENEMY?

...
Sian John | 17 Oct 2013 | 1 comment

What does an organisation mean by the term 'confidential'? How does it actually apply in practice - does it actually fit with the day to day activities of the business? Do people use the term in anger? And, most of all, is it enforceable?

Some organisations can tend to bandy around such words without really having a clear idea what they stand for or, indeed, what we should do about them. While very few companies are what we might term 'best in class' for in our experience, implementing best practice around document markings does not have to be onerous. 

From working with clients we know that businesses working in more regulated sectors tend to over-classify information, preferring to protect more than is necessary rather than being caught out. While an "If in doubt, keep it in" approach does make corporate documents more secure, it can add unnecessary, potentially avoidable cost. 

Meanwhile, unregulated...

Caroline Dennington | 14 Oct 2013 | 0 comments

In the era of Big Data – and a future that promises nothing less than even Bigger Data – you need Big Weaponry to defend your organisation, people and systems from modern attacks. What once was considered adequate to shore up your defences and keep you safe just doesn’t cut it anymore.

Look back only a short while ago and what was then regarded as muscular security and robust levels of resistance would now be seen as little more than the equivalent of tissue paper trying to halt a boulder. Times have changed beyond recognition. The threat landscape of today demands a whole new approach to protecting your business.

It’s a reality that Siân John, Directory of Security Strategy, UK/Ireland, Symantec, will be bringing into sharp focus at RSA Conference Europe in Amsterdam this month (29-31 October).

In her session, ‘Using Big Intelligence to Defend against Modern Attacks...

Straners | 11 Oct 2013 | 0 comments

Back in 2012, when we made our storage predictions for this year, we remarked on the relevance of the "software defined" tag to the orchestration of storage resources: "Software defined storage will have significant impact on cloud, appliances and SSDs/Flash storage implementations.  Software that is policy-based and treats storage resources agnostically will increase in order for data centers to become more adaptive."

So, how is this playing out? The addition of a layer of non-proprietary software abstraction creates the opportunity to manage storage more flexibly, which is a worthy goal. Software-defined storage has the potential to spell the end of over-provisioning as storage can be allocated more accurately from a wider pool. It also frees organisations from the cost overheads associated with proprietary storage.

Most of all it enables storage to be managed in a way which fits with application needs rather than the other way...

PFN | 02 Oct 2013 | 0 comments

The recent arrival of Symantec’s Data Insight 4.0 on the scene marks an important milestone for customers everywhere. Why? Because the new solution represents a major step forward in Symantec's on-going commitment to deliver solutions that are fully integrated, making it far easier for organizations to protect and manage their information.

Most importantly, through actionable intelligence into data ownership, usage and access, Data Insight will help customers improve governance for unstructured data – such as documents, presentations, spreadsheets and emails. Moreover, Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations further reduce costs and risk, achieve compliance and gain insights into their unstructured data.

What about that unified approach to data governance – how is that...