Video Screencast Help
Symantec Analyst Relations
Showing posts in English
Symantec Analyst Relations | 21 Jul 2014 | 0 comments

Vision Channel Day, 8th July 2014 | Vision Symposium, 9th July 2014

In 2014, Symantec is creating a multi-day, flagship event, Vision Las Vegas, which will kick off a series of two-day events in cities throughout Europe, Asia, and South America.

Vision Symposium 2014 will feature deeper insights into Symantec´s strategy, more big announcements, and unprecedented exposure to upcoming Symantec solutions - all tailored for businesses and IT professionals at every level.

Please see below for highlights from the Symantec Vision Channel Day and Vision Symposium in Munich.

Keynote Part 1: Stefan Henke, Country Manager, Germany and Frank Thonüs, Regional Director, EMEA PACSS Region and others

Keynote Part 2: Learn about the...

Drew Meyer | 17 Jul 2014 | 0 comments

Symantec’s unified vision and new array of solutions around its Information Management (IM) offering are propelling customers towards ever greater agility, freedom of choice and the highest levels of security in what is becoming an increasingly complex and disparate IT environment for organizations everywhere.

That was the good news we were able to deliver at a recent webinar for the APJ region where industry analysts gathered to hear how environments spanning both physical and virtual can be better managed using our IM solutions. What we were able to tell everyone was exactly how we are now able to reduce those complexity issues they face every day, supporting our customers as they perform crucial functions around archiving, data protection and backup, and data recovery.

In a world where the move into the cloud is accelerating – public, private and hybrid –customers want to leverage all the advantages this may offer by having the flexibility of running any operating...

Sian John | 15 Jul 2014 | 0 comments

An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.
This question becomes increasingly important when considering software-defined networking (SDN) or more specifically, what happens as the creation of virtual machines becomes increasingly automated?
As use of SDN increases, so it becomes more important to ensure all security features are enabled - such as intrusion protection, firewall and behavioural monitoring - not just antivirus.
This is primarily because it may not always be obvious how and where a VM is to be used, and therefore how well protected it needs to be. However it is not so straightforward to run some features 'off-VM' - for example behavioural monitoring requires direct access to system resources.
Equally there are times when it makes more sense to run...

Paul Wood | 14 Jul 2014 | 0 comments

Trends are complicated things. Consider, for example, the threat often called Ransomware. In our annual Internet Security Threat Report, all signs were that it was following a steady growth path which would continue into 2014. However, more up to date intelligence (as documented in our May 2014 Intelligence Report) suggests otherwise. It remains to be seen if the threat is cyclic, so we shall continue to watch with interest.

So, what gives? To understand Ransomware, we need first to understand how and why it emerged. Before Ransomware another form of extortion was prevalent, called Fake Antivirus (Fake-AV, or rogue security software). This would find its way onto a victim’s computer through email, website drive-by or other means, and then...

Symantec Analyst Relations | 01 Jul 2014 | 0 comments

Customers, partners and analysts gathered together to hear the latest on Symantec’s unified vision for its security portfolio and insights on the company’s new Managed Security Services – Advanced Threat Protection (MSS – ATP).

Held at the Raffles Convention Centre, the Singapore Symantec Security Symposium began with Country Director Yuh Woei Tan’s opening note that set the theme of the event – “Proactive. Practical. Trusted Security”– in place. The theme was also echoed by Sean Doherty, Vice President of Technical Strategy & Operations, whose keynote on Symantec Unified Security homed in on the billions of attacks that are happening to our customers each year. In an environment where breaches are inevitable and information is everywhere...

tgrandpre | 26 Jun 2014 | 0 comments

If there is one message that Symantec would like you, the analyst community, to recognise and take on board right now, it is this: We are not slowing down in the least. Symantec has real momentum and conviction around where it wants and plans to be – and nowhere is this better demonstrated than in our recent acquisition of NitroDesk, which totally reaffirms our commitment to mobile.

This is a great purchase for Symantec and our customers, enabling us to integrate NitroDesk’s mature email application with Symantec’s existing app-wrapping, device management, threat protection, data loss prevention, authentication and identity technologies – thus delivering a solution that improves business collaboration and out-of-office productivity.

At the same time, you can expect further mobile enhancements to be rolled out in the coming months to...

fbunn | 17 Jun 2014 | 0 comments

While Communications Service Providers (CSPs) tell their customers they are more than ‘simply' network utilities, it stands to reason that they need to provide similar levels of service to traditional utility companies such as water or energy providers. 

In security terms this means offering a certain level of information protection - as has been said more than once, just as we expect water to come out of our pipes clean, so we expect the same for our information. 

This doesn’t mean that the onus is entirely on the CSP, of course. Across the history of end-point security, providers and software vendors have had to work together to help protect the confidentiality, integrity and availability of data whether it is at rest on a PC, or in transit across the network. 

More recently, the rise of mobile computing has seen handsets start simple and become increasingly complex, meaning that consumers are not always well prepared against...

Symantec Analyst Relations | 05 Jun 2014 | 0 comments

Symantec recently announced an entirely new approach to advanced threat protection ( unveiling a roadmap of integrated solutions that demonstrates the security innovation power that only it can deliver to help customers solve their most complex problems.

In our upcoming analyst webcast, hear from Brian Dye, SVP Information Security Group, and Piero DePaoli, Sr Director Product Marketing, for a deeper look at Symantec's ATP strategy, product roadmap as well as our new offerings. Following a short video presentation, we will host a live Q&A session with both Brian and Piero.

When: Tuesday, June 17, 9:00am PT / 5:00pm UK Time

We hope that you will be able to join us for this informative webcast. Please contact or...

msmart007 | 05 Jun 2014 | 0 comments

In a previous blog, I described a number of dilemmas around cybersecurity - notably how its presence as a board room topic sits uneasily with the IT department’s poor perception of security, which couples with an increasing realisation that cyber threats cannot be addressed with IT alone. Even as technology becomes intrinsic to business life in this, hyper-connected world, the bad guys are developing ever more targeted threats as we see in our recent Internet Security Threat Report (ISTR).

It’s not up to us security experts to rain on this parade or tell the businesses we advise they’re doing it all wrong - I doubt they would listen even if we did. Our enterprise customers tell us their businesses wouldn’t be where they were today without taking risks, be they financial, organisational or indeed...

Straners | 29 May 2014 | 0 comments

All too often, technology is subject to the law of unintended consequences - a great, positive example is SMS, which was originally planned as a tool for maintenance alerts. Less positive is the exploitation of the humble macro system in documents and spreadsheets, or the use of email for social engineering attacks. 

Designers of such features can say they weren’t supposed to be used like that, but the fact is that when a new innovation arrives, people will start taking it in unexpected directions. We’ve seen this most recently with mobile technologies yielding Bring-Your-Own-Device (BYOD), the various benefits being tempered by consequences such as manageability and security. 

One of the more interesting parts of my job is asking what is coming next, and what the impacts - positive and negative - might be. A particular area of interest (and concern) is the Internet of Things (IoT), a term being used to describe what happens when...