Video Screencast Help
Symantec Analyst Relations
Showing posts in English
D Thomson | 25 Sep 2012 | 0 comments

The topic of aligning what the IT organisation delivers compared with what any given business actually needs has been the source for much debate for as long as our industry has existed. IT-Business alignment is one of those topics that many speak about but few actually practice as part of a business culture. I think that part of the reason for this is that there are very few best practices that have been proven to be successful in providing a platform on which the consumers and the providers of  IT service can speak in a common language to agree priorities and understand one another’s perspectives.

I have been involved in a project at Symantec for around 8 years now which, I think, makes some progress in this area. We call it INFORM and it relies on a simple methodology that attempts to provide a forum for discussion with the “IT-Business alignment” goal in mind.

The methodology (somewhat revealingly, some would...

Neal Watkins | 22 Sep 2012 | 0 comments

 

As head of the Field Technology Sales organisation for Symantec in EMEA, I find myself in some extraordinarily interesting meetings. None more so than a recent half-day workshop with our technology peers at VMware down at Frimley in Camberley.

It was a meeting of minds from a group of extremely passionate individuals — and an ideal opportunity to brainstorm big ideas to resolve some of the challenges that are stopping our customers from virtualising more of their physical infrastructure.  Two of the greatest challenges right now: Regulatory compliance and the cloud, which resulted in two great use cases, which we can solve today.

The first major use cases to emanate from the workshop was the whole issue of security in a virtualised environment. Talk turned to the retail sector. Retailers large and small need to establish a security baseline across their virtual IT environment that protects payment card information, in order to meet the...

John_Brigden | 19 Sep 2012 | 0 comments

Clouds are a law unto themselves. They float freely, without regard for geographic, political or national demarcation lines. With a fair wind at their disposal, they can go more or less wherever they please. Of course, you could also argue that they are at the mercy of the elements and that these control their every move.

Which creates a clever analogy with cloud computing. Should it be allowed to ‘wander’ wherever it might please, without restriction, or should there be forces in place that dictate how and where they may operate?

It’s a big question and there are big numbers involved, with the market for cloud computing having surged in recent years. Market research firm IDC expects businesses worldwide to spend $28.2 billion on cloud services this year alone, up from $21.5 billion in 2010, with spending forecast to more than double to $57.4 billion by 2014.

Right now, the European Commission is knee deep in finalising a strategy on cloud...

Symantec Analyst Relations | 12 Sep 2012 | 0 comments

The August edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from May 2011 through August 2012.

Report highlights

  • Spam – 72.3 percent (an increase of 4.7 percentage points since July)
  • Phishing – One in 312.9 emails identified as phishing (an increase of 0.109 percentage points since July)
  • Malware – One in 233.1 emails contained malware (a decrease of 0.14 percentage points since July)
  • Malicious Web sites – 1 website blocked per day (a decrease of 49.8 percent since July)
  • The state of data breaches to date in 2012
  • A look at a malicious email scam that pretends to come from Symantec
  • A new Java zero-day vulnerability appears in...
Symantec Analyst Relations | 30 Aug 2012 | 0 comments

With IT budgets that are shrinking or barely holding steady, it’s vital for today’s businesses to make the most of their current infrastructure. Fortunately, however, leveraging virtual infrastructure to enable cloud computing is possible without having to rip and replace the entire infrastructure. Whether an organization is replacing legacy technologies or adapting them to virtualization, Symantec and VMware have teamed up to help businesses make the transition to virtualization as smoothly as possible – with approximately 100 points of integration to date.

Read more here

 

 

 

 

 

Neal Watkins | 28 Aug 2012 | 2 comments

Keyboard finger trouble again! I just sent around a 10MB slide presentation to 25 people on cc when I meant to only send it to one person. That’s another 250MB added to data storage somewhere down the line. Still, it’s a drop in the ocean compared with the amount of data growth worldwide. Pick up any analyst report, magazine, or survey and even the most conservative estimates put the rate of growth at around 60 percent per annum; and it is even higher for companies with data-intensive applications, in high-growth markets, or with widely distributed data centres or staff.

As I travel across EMEA talking to customers—right the way from top 20 global organisations down to SMBs—more and more of them think they have found the ‘holy grail’ to controlling this data growth. They think they’ve finally found a mechanism to stop buying storage for all that data emanating from their physical and virtual platforms, mobile, and Cloud. It’s...

D Thomson | 28 Aug 2012 | 0 comments

Throughout 2011 and 2012 so far, it has been interesting to see how organisation’s cloud computing projects have begun to turn from strategy to reality. From plan to execution..

In my role at Symantec, I am lucky enough to be involved (to a greater or lesser extent) in various cloud initiatives both in the form of end-user IT organizations building “private clouds” or consuming external services and service provider organisations building public offerings. Through this work, I am constantly struck by how traditional IT service management and risk management disciplines remain crucial and relevant to these modern projects that sit on the leading edge of IT.

In addition, new lessons are bring learned by organisations who are building (or consuming) “clouds”. Many of these lessons are not complicated and, in hindsight, seem obvious. They are lessons, however, that will kill a cloud project stone dead if not considered early and...

GregDay-SecurityCTO | 22 Aug 2012 | 0 comments

There is often talk of the growth in mobile threats and, in 2011, we saw significant growth, in terms of volume as a percentage. Yet, as a total of the numbers involved, these were still relatively small – in the thousands, rather than hundreds of millions that unleashed themselves on the PC last year.

At the same time, we did see far greater innovation in the nature of mobile threats, with attackers focusing in on finding vulnerabilities to exploit, such as the botnet concept, as well as where money can be made and information stolen through smart devices.

So what is the right way to manage that threat and soften its impact?

Let me start by looking at process – and please bear with me as I do. In the past 10 years, the cost of a laptop computer has plunged by a massive 90%, while already it’s...

Sridhar Ramanathan | 20 Aug 2012 | 0 comments

 

While consumer-accessible, hosted storage is nothing new, it was in the wilderness a number of years before reaching the mainstream. Early offerings from the likes of now-defunct X:Drive seemed great in principle, offering 5Gb in storage which (back in 2006) sounded like all anyone would ever need. But for one fatal flaw - the bandwidth simply wasn't there. Neither homes nor mobile devices had sufficiently fast throughput capabilities for online storage to be usable. 

 

Half a dozen years later, we can see a very different picture. The consumerisation phenomenon is in full swing, with employees preferring to use their own mobile phones, access online applications that they choose, and indeed make use of hosted storage now that the bandwidth barriers to entry have been removed.

 

While consumerisation is a frequent topic of discussion however, it is normally...

Symantec Analyst Relations | 08 Aug 2012 | 0 comments

The July edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through June 2012.

Report highlights

  • Spam – 67.6 percent (an increase of 0.8 percentage points since June)
  • Phishing – One in 475.3 emails identified as phishing (a decrease of 0.003 percentage points since June)
  • Malware – One in 340.9 emails contained malware (a decrease of 0.023 percentage points since June)
  • Malicious Web sites – 2,189 Web sites blocked per day (an increase of 4.0 percent since June)
  • Olympic related scams and threats to keep an eye on
  • Web attack toolkit activity in the first six months of 2012
  • A roundup of the best blogs of the last month...