Video Screencast Help
Symantec Analyst Relations
Showing posts in English
D Thomson | 28 Aug 2012 | 0 comments

Throughout 2011 and 2012 so far, it has been interesting to see how organisation’s cloud computing projects have begun to turn from strategy to reality. From plan to execution..

In my role at Symantec, I am lucky enough to be involved (to a greater or lesser extent) in various cloud initiatives both in the form of end-user IT organizations building “private clouds” or consuming external services and service provider organisations building public offerings. Through this work, I am constantly struck by how traditional IT service management and risk management disciplines remain crucial and relevant to these modern projects that sit on the leading edge of IT.

In addition, new lessons are bring learned by organisations who are building (or consuming) “clouds”. Many of these lessons are not complicated and, in hindsight, seem obvious. They are lessons, however, that will kill a cloud project stone dead if not considered early and...

GregDay-SecurityCTO | 22 Aug 2012 | 0 comments

There is often talk of the growth in mobile threats and, in 2011, we saw significant growth, in terms of volume as a percentage. Yet, as a total of the numbers involved, these were still relatively small – in the thousands, rather than hundreds of millions that unleashed themselves on the PC last year.

At the same time, we did see far greater innovation in the nature of mobile threats, with attackers focusing in on finding vulnerabilities to exploit, such as the botnet concept, as well as where money can be made and information stolen through smart devices.

So what is the right way to manage that threat and soften its impact?

Let me start by looking at process – and please bear with me as I do. In the past 10 years, the cost of a laptop computer has plunged by a massive 90%, while already it’s...

Sridhar Ramanathan | 20 Aug 2012 | 0 comments

 

While consumer-accessible, hosted storage is nothing new, it was in the wilderness a number of years before reaching the mainstream. Early offerings from the likes of now-defunct X:Drive seemed great in principle, offering 5Gb in storage which (back in 2006) sounded like all anyone would ever need. But for one fatal flaw - the bandwidth simply wasn't there. Neither homes nor mobile devices had sufficiently fast throughput capabilities for online storage to be usable. 

 

Half a dozen years later, we can see a very different picture. The consumerisation phenomenon is in full swing, with employees preferring to use their own mobile phones, access online applications that they choose, and indeed make use of hosted storage now that the bandwidth barriers to entry have been removed.

 

While consumerisation is a frequent topic of discussion however, it is normally...

Symantec Analyst Relations | 08 Aug 2012 | 0 comments

The July edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through June 2012.

Report highlights

  • Spam – 67.6 percent (an increase of 0.8 percentage points since June)
  • Phishing – One in 475.3 emails identified as phishing (a decrease of 0.003 percentage points since June)
  • Malware – One in 340.9 emails contained malware (a decrease of 0.023 percentage points since June)
  • Malicious Web sites – 2,189 Web sites blocked per day (an increase of 4.0 percent since June)
  • Olympic related scams and threats to keep an eye on
  • Web attack toolkit activity in the first six months of 2012
  • A roundup of the best blogs of the last month...
Sridhar Ramanathan | 06 Aug 2012 | 0 comments

 

The term ‘file sharing’ evokes a variety of emotions. Clearly, sharing documents and other content between peers is a useful thing to be able to do, particularly in the corporate context. Equally illegal downloads, Napster and Pirate Bay, torrents and warez, file sharing has all done their best to give this most basic of computer functions a bad name.  

 

Despite corporate file sharing tools being around for some time, this is perhaps why they have only recently become a more accepted part of the corporate IT tool kit. Few would doubt their usefulness, for example for exchanging very large files, collaborating on documents or distributing up-to-date versions of information. All very useful functions, but as with any technology, IT decision makers need to think carefully about the associated risks. 

 

Perhaps the biggest of these is data leakage. Shared folders appear like normal folders on a...

Sian John | 06 Aug 2012 | 0 comments

 

Contingency planning is a necessary evil. Like dental checks or car servicing, it gets in the way of doing more useful things such as - in business terms - actually making money or delivering services. All the same, there is never a bad time to have a think about what might go wrong, and put measures in place that can either mitigate the risks, or minimise the potential damage. 

Indeed, when it comes to information systems - some of which will inevitably store customer data - most organisations have no choice given data protection law. An added complication is how to decide what actually constitutes a valid risk, however. While some threats seem genuine - a 'clear and present danger' if you will - others fall into the category of problems that only happen to other people. 

Distributed Denial of Service attacks are a case in point - that is, attacks which prevent computer systems or web sites form being accessed. In the past, DDoS was...

D Thomson | 02 Aug 2012 | 0 comments

As discussed in previous blogs the topic of the “information explosion” seems to be top of mind for many IT execs today (unstructured data being the chief protagonist responsible for data growth in most companies). Many IT organisations have, until now, relied on the collapsing cost of storage as a risk mitigation technique & “band-aid” strategy (“well,  disks are no longer costing what they used to so we just broker very cheap deals and add racks to the datacentre”)..

This somewhat tactical and short-sighted approach has its obvious short-comings.. For one, 2002 was the last year in which disk price performance kept up with information growth. Secondly, all this “cheap” disk needs somewhere to live (and it needs to be cooled, powered, administered…).

It is predicted that the growth of data will be 800%, with 80% unstructured data in the next 5 years. While enterprise data is growing at a rate of 40% to...

Symantec Analyst Relations | 25 Jul 2012 | 0 comments

"Sometimes I like to think of Symantec as an elephant," said Angela Tucci, Symantec’s chief strategy officer, over lunch at London’s Soho Hotel. "Depending on which side of the elephant you look at," she explained, "you get a completely different perspective of the creature."

Read the following interview with Angela Tucci, Chief Strategy Officer at Symantec on her views around Mobile, Cloud, Virtualization, strategic acquisitions and rebranding Symantec here

Neal Watkins | 22 Jul 2012 | 0 comments

St. Paul’s Cathedral has dominated the London skyline for more than 300 years, while almost everything around it has changed. From the street to the Shard, the traffic to the tourists, it’s all new, while the Cathedral has stayed the same. The same is true of the data that dominates our lives.

Although you might think data is constantly changing, it remains the one invariable in a dynamic IT landscape. Anyone the wrong side of 40 will remember the different eras of IT. First we had the mainframe period, then the dawn of the PC, followed by the brief, bright light of client/server computing. Next came the Internet and collaborative computing. Throughout the last 30 years, the bedrock of all those eras has been data. Yes, there’s more of it—unstoppable amounts in fact—but it’s always been there, always needed to be protected, secured, and kept available.

Right now, we’re in the post-PC era, where everything is Cloud-enabled, and...

GregDay-SecurityCTO | 18 Jul 2012 | 0 comments

While the BBC recently reported the existence of Shodan, a searchable online database of Internet-connected control devices, the fact is that the site has been around for a couple of years now. Shodan holds information about every type of system from standalone computers to industrial scale equipment controllers, such as the Dutch canal control system mentioned on the BBC report.

Shodan isn't the only kid on the block. The "Every Routable IP Project" (ERIPP) aims to build a database of every internet-accessible device - a seemingly innocuous goal. While the existence of such search engines may not be 'new' news, it is certainly worth broadcasting the fact they are still seen as relevant as they offer a shockingly useful resource. With relatively little experience or...