Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Peter_E | 04 Jun 2012 | 0 comments

Data is one of our most critical assets, and we’ve all got too much invested in it to lose it. I'd say the same thing to an elderly relative about keeping valuable photos in a biscuit tin, as I would to a large corporation with a broken backup strategy and years of backup data. And, the chances are, I would get much the same response - a combination of agreement and an embarrassed shrug, suggesting the problem is clearly important, but that the same old approach works well enough for now. 

Where corporate backups are concerned, it's not as if people haven't tried to make change. Backup strategies have been around since someone first suggested putting punched cards in a fireproof safe. And these strategies have evolved as well, but a number of very real issues, not least of which include complexity and data growth now demand a new approach. 

Every few years an organization will make it a priority to update backup systems, storage and...

Sarah Whipp | 01 Jun 2012 | 0 comments

When will we in the vendor community learn? Forrester just released a piece of research saying that Tech Channels Have a Long Way To Go Toward Adding Marketing Value http://community.forrester.com/thread/8287. It brought me back to the last millennium when I just transferred to the dark side – a vendor marketing role. I had a conversation with a senior representative of a very large manufacturer who took the opportunity to tell me where I had gone wrong all those years in partner land “your problem” he happily told me “ was that you never focused on what I wanted you to”, I smiled back and said “no, I focused on what my company needed me to.” This to me at the time was the crux of the issue with the way vendors treated partners, not understanding that the partner is there to grow his or her own business, ideally but not exclusively growing the vendors overall...

D Thomson | 31 May 2012 | 0 comments

Some of the reticence around using “the Cloud” seems to have come from the question of whether it can be trusted – particularly when it comes to managing corporate data. Cloud has its risks, just like any architecture or approach, which need to be weighed up against the risks of running things in-house. 

I think there is a bigger question however, which goes beyond mere risk. Cloud computing came into existence as part of a natural progression in how we use technology resources. But this goes far wider than merely cloud. Two additional factors illustrate the broader landscape, namely how we are becoming more mobile, and how people are increasingly making their own technology decisions. 

This is not the moment to delve into these parallel trends, respectively nicknamed mobility and consumerisation. The point is that they are inextricably linked, and internet-based technology service delivery – aka cloud computing – is another...

Brad | 17 May 2012 | 0 comments

I don’t need to repeat what my esteemed colleagues have already been sayingabout the mobility-related announcements we made at Symantec Vision this year. However, it is worth picking up on some of the context – not least about how organizations are dealing with the challenges.

Earlier this year we released the results of a global survey into enterprise mobility. From the 6000-plus responses, most findings corroborated what we have been hearing from our own customers. Notably that mobile technologies do make it easier, more efficient and effective, to do business – even though they create new challenges which need to be addressed.

Indeed, 41% of respondents placed mobile computing at the top of the pile of technology-...

Sarah Whipp | 17 May 2012 | 0 comments

 

We’re hearing a great deal about 'information' in the media at the moment. According to both analysts and the word on the street, businesses have greater access to a broader set of information than ever they did in the past. As one of the main areas of impact, we are told, is in marketing and advertising (LINK: http://www.bbc.co.uk/news/business-17764117), I'm clearly going to be interested.

 

Information is the foundation of marketing and business as a whole. And unless you analyse it correctly, any decision you make is based on hope, luck and gut feeling alone.  This has always been true, but as the amount of unstructured information grows, the challenge for companies is ensuring that their departments and teams use a common data set for critical business decisions.

 

Information growth and real time access is a blessing to companies...

Jon C | 16 May 2012 | 0 comments

Earlier this month, the European Commission's Digital Agenda lead Neelie Kroes launched a consultation - a.k.a. an online research study - into the Internet of Things (IoT) and its ramifications. Given that the EC has been talking about "identifiable smart objects", i.e. "things" for several years now, the obvious question is, what has prompted another consultation on the subject?

Two reasons spring to mind - the first, as Neelie herself says, "An Internet of Things with intelligence embedded into everyday objects is the next big thing." As we all know, when technologies reach the mainstream, we need to rethink what risks they pose and what can be done about them. And as IoT becomes more front of mind, such consultations are likely to get a better (and more comprehensive) response.

The second...

Symantec Analyst Relations | 14 May 2012 | 0 comments

Cross-posted from Symantec Security Response blog

Join Symantec security experts on Twitter (using the #ISTR hashtag) on Tuesday, May 15, at 10 a.m. PT / 1 p.m. ET to chat about the key trends highlighted in Symantec’s recently released Internet Security Threat Report, Volume 17.

This year’s report, which covers the major threat trends observed by Symantec in 2011, highlights several troubling developments. For example:

  • Symantec blocked more than 5.5 billion malicious attacks in 2011, an increase of 81 percent over the previous year.
  • The number of unique malware variants increased to 403 million and the number of Web attacks blocked per day increased by 36 percent.
  • Targeted attacks are growing,...
Symantec Analyst Relations | 29 Apr 2012 | 0 comments

Symantec’s Internet Security Threat Report showcases the threat landscape in 2011, highlighting that the number of malware attacks increased by 81 percent. Read the report to get the latest on key trends including advanced targeted attacks that are expanding to focus on organizations of all sizes, increased data breaches, and a continued focus on mobile threats by attackers.

Additional resources

Multimedia:

nicolas_popp | 24 Apr 2012 | 0 comments

We can blame networking. IT security was never simple, even when computers were largely stand-alone machines connected to banks of green-screened terminals. However interfaces between systems were generally inaccessible to all but operations staff.

It was when we started to allow outside connections that things stepped up a level in terms of risks. First dial-in connections, then local area networking meant that access was available to anyone who had appropriate communications tools.

It was around this time that security professionals invented the term 'defence in depth'. The idea was that security existed as circles within circles, each layer protected at the boundary by appropriate technology.

Then the Internet came along and changed everything again. Without going through the entire history of the past two decades, we're now at a point where data can be in any one of several places – on corporate systems, on computers in home offices, on...

GregDay-SecurityCTO | 24 Apr 2012 | 0 comments

A conversation I sometimes get involved in with customers is, "How should we secure vSphere?" The environment doesn't have to be VMware-based of course, it could be Xen, Microsoft, Red Hat or any other, but the question remains. 

From a technical perspective, the set of risks is reasonably well understood and by and large appropriate mitigations exist. For example each virtual machine, and the network connections between VMs need to be as secure as their physical equivalents. Meanwhile security holes could exist in the hypervisor layer, as with any other software package. Protections such as defence in depth, intrusion detection and prevention, patch management and so on remain much the same as in the traditional, physical world.

However, the net-new of a virtualised environment lies in how VMs are provisioned and managed. It is clearly much easier to deploy a virtual machine...