Video Screencast Help
Symantec Analyst Relations
Showing posts in English
Philip Routley | 24 Oct 2013 | 0 comments

I always like to start with the good news. So, according to the findings of the 2013 Norton Report, the number of online adults who have experienced cybercrime has decreased. Time to celebrate? Not quite. Because the average cost per victim has risen by a staggering 50 per cent.

And it’s all down to a change of tactics on the part of the cybercriminals, who are now using far more sophisticated attacks, such as ransomware and spear-phishing, where the financial yield per attack is higher than ever before. As Symantec’s chief technology officer Stephen Trilling rightly points out to the unwary. “With the findings from the Norton Report that 49% of consumers use their personal mobile device for both work and play, this creates entirely new security risks for enterprises, as cybercriminals have the potential to access even more valuable information.”

SLEEPING WITH THE ENEMY?

...
Sian John | 17 Oct 2013 | 1 comment

What does an organisation mean by the term 'confidential'? How does it actually apply in practice - does it actually fit with the day to day activities of the business? Do people use the term in anger? And, most of all, is it enforceable?

Some organisations can tend to bandy around such words without really having a clear idea what they stand for or, indeed, what we should do about them. While very few companies are what we might term 'best in class' for in our experience, implementing best practice around document markings does not have to be onerous. 

From working with clients we know that businesses working in more regulated sectors tend to over-classify information, preferring to protect more than is necessary rather than being caught out. While an "If in doubt, keep it in" approach does make corporate documents more secure, it can add unnecessary, potentially avoidable cost. 

Meanwhile, unregulated...

Caroline Dennington | 14 Oct 2013 | 0 comments

In the era of Big Data – and a future that promises nothing less than even Bigger Data – you need Big Weaponry to defend your organisation, people and systems from modern attacks. What once was considered adequate to shore up your defences and keep you safe just doesn’t cut it anymore.

Look back only a short while ago and what was then regarded as muscular security and robust levels of resistance would now be seen as little more than the equivalent of tissue paper trying to halt a boulder. Times have changed beyond recognition. The threat landscape of today demands a whole new approach to protecting your business.

It’s a reality that Siân John, Directory of Security Strategy, UK/Ireland, Symantec, will be bringing into sharp focus at RSA Conference Europe in Amsterdam this month (29-31 October).

In her session, ‘Using Big Intelligence to Defend against Modern Attacks...

Straners | 11 Oct 2013 | 0 comments

Back in 2012, when we made our storage predictions for this year, we remarked on the relevance of the "software defined" tag to the orchestration of storage resources: "Software defined storage will have significant impact on cloud, appliances and SSDs/Flash storage implementations.  Software that is policy-based and treats storage resources agnostically will increase in order for data centers to become more adaptive."

So, how is this playing out? The addition of a layer of non-proprietary software abstraction creates the opportunity to manage storage more flexibly, which is a worthy goal. Software-defined storage has the potential to spell the end of over-provisioning as storage can be allocated more accurately from a wider pool. It also frees organisations from the cost overheads associated with proprietary storage.

Most of all it enables storage to be managed in a way which fits with application needs rather than the other way...

PFN | 02 Oct 2013 | 0 comments

The recent arrival of Symantec’s Data Insight 4.0 on the scene marks an important milestone for customers everywhere. Why? Because the new solution represents a major step forward in Symantec's on-going commitment to deliver solutions that are fully integrated, making it far easier for organizations to protect and manage their information.

Most importantly, through actionable intelligence into data ownership, usage and access, Data Insight will help customers improve governance for unstructured data – such as documents, presentations, spreadsheets and emails. Moreover, Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations further reduce costs and risk, achieve compliance and gain insights into their unstructured data.

What about that unified approach to data governance – how is that...

Symantec Analyst Relations | 01 Oct 2013 | 0 comments

This Blog was originally posted in Security Response

The ZeroAccess botnet is one of the largest known botnets in existence today with a population upwards of 1.9 million computers, on any given day, as observed by Symantec in August 2013. A key feature of the ZeroAccess botnet is its use of a peer-to-peer (P2P) command-and-control (C&C) communications architecture, which gives the botnet a high degree of availability and redundancy. Since no central C&C server exists, you cannot simply disable a set of attacker servers to neuter the botnet. Whenever a computer becomes infected with ZeroAccess, it first reaches out to a number of its peers to exchange details about other peers in its known P2P network. This way, bots become aware of other peers and can propagate instructions and files throughout...

Peter_E | 01 Oct 2013 | 0 comments

Massive data growth is putting pressure on IT staff as they struggle to not only protect important applications, systems, and data, but recover it according to expectations or SLAs. Given that many companies have as many as seven different backup products in their environments, both protecting the data reliably and ensuring successful recovery is difficult & costly. Building, running, and managing the infrastructure required for multiple backup and DR solutions is increasingly complex and expensive, especially in larger multi-site environments.  As a result, customers are looking at ways to reduce both operational complexity and cost by asking themselves how much of their backup infrastructure they want to build vs.buy. Integrated backup appliances offer an evolution from traditional storage appliances by providing a turnkey solution to quickly deploy a proven solution.

Data protection is, of course, all about recovering your data in the event of an accident,...

Sancharini | 30 Sep 2013 | 0 comments

The theme of this year's Symantec Symposium events for customers and partners, held in Sydney and Melbourne this September, was guided by the fact that the world of business, and therefore our data centre and enterprise customers, is changing. While some of the changes are demographic, the lowering cost and potentially increased value of technology is also having an impact, at the same time as its increasing complexity and risk. 

Symantec's 4.0 strategy was created in response to these shifts, and we have never been more excited to express about what we are doing as a company or how we are working with our customers, globally and regionally. At the Sydney event, we invited analysts from both global and local firms update them on Symantec’s overall strategy, to explore selected solutions in detail and provide insight into Symantec’s business and go-to...

Caroline Dennington | 20 Sep 2013 | 0 comments

As mentioned in Phil’s blog last week, he has asked me to give you a little more insight in to the Verticals focus as part of Symantec 4.0.   Here at Symantec, we understand the strategic importance of the Vertical markets and as part of the transformation, there is now a dedicated Global & Vertical Offerings Integration team.  This team is focused on ensuring the right offerings for our customers across the verticals along with making certain we are addressing new routes to market in order to evolve our go-to-market strategy.

Many of you will know that Steve Bennett communicated earlier this year that there will be four verticals that we are going to focus on namely: Telco, Public Sector, ISPs and XaaS.  We will also continue to focus on other industries such as Healthcare, Manufacturing, Finance and Energy, all verticals where we have seen success over the years.   ...

Sian John | 16 Sep 2013 | 0 comments

Cybersecurity is certainly a hype word in the press at the moment. Security professionals and CSOs that are longer in the tooth are saying, "move along, nothing new here" - are they right? To answer this, we need to take into account that we have always had a sliding scale, with security at one end and usability at the other. Remember the old adage that the most secure computer is the one buried in a box, encased in concrete. 

The trouble is, users are like rivers - they will find the easiest way down the hill. If security mechanisms are too taxing, users will look for ways round them - or indeed stop using the systems altogether, for example by storing information locally rather than trying to access unusably secure corporate systems. 

The shifts we are seeing today are largely driven by the increasing speed and complexity of technological change. Not that long ago, organisations were looking to protect computers, systems and databases...