Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Symantec Analyst Relations | 14 Jun 2011 | 0 comments

By the end of 2013 more than 75 percent of U.S. employees—and more than 1 billion workers worldwide—will routinely work outside a traditional office environment.1 Increasing numbers of employees will need to remotely access the corporate network. Even people working from the office will be using the Internet to do their jobs, as organizations adopt the software-as- a-service (SaaS) application delivery model.

Enterprises have traditionally used two-factor authentication (2FA) to secure access to corporate resources remotely. Due to their relative ease of use and familiar end-user paradigm, One-Time Password or OTP-based solutions are the most widely used 2FA solution deployed by enterprises today. As 2FA vendors and Enterprise IT professionals gain experience deploying these solutions, the true cost or “total cost of ownership” (TCO) becomes apparent, and can be estimated quite accurately across different authentication solutions.

This White...

Symantec Analyst Relations | 14 Jun 2011 | 0 comments

Large numbers of corporates are migrating their IT resources to a virtual machine environment - largely thanks to the cost savings and convenience that the leading edge technology offers. But the security strategies required for thus brave new virtual world are radically different to those most of us are experience in.

In this 60 minute webinar there will be a panel of experts - including key Symantec and VMware security experts - who will explain what security planning strategies and technology solutions can assist IT professionals tasked with moving their business IT systems over to a virtual platform.

Please register here

Symantec Analyst Relations | 14 Jun 2011 | 0 comments

As individuals and organizations improve their understanding of the environmental impact of computing technology, concepts such as “green IT” and corporate responsibility have gained great importance and value. Going forward, equations such as total cost of ownership (TCO) and return on investment (ROI) will be forever altered by considerations related to energy consumption, carbon footprint and overall environmental efficiency and impact. Read more

Symantec Analyst Relations | 13 Jun 2011 | 0 comments

The battle for brand loyalty in the mobile space continues to be hard fought, with players such as Apple, Blackberry, HTC, Nokia, Motorola and Samsung duking it out on devices, and Google, Microsoft and Apple in terms of operating systems. Understandably so – the consumer in most of us is a follower of fashion, with only a minority buying a device purely on functionality. 

Given amount of noise generated on comparison sites, forums and blogs, not to mention in pubs, cafes and elsewhere, how can Enrique Salem claim that devices are irrelevant? “You don't really care what device you have,” he says. “If you have a BlackBerry device or an Apple device or a Motorola device, that's not what matters.” How does this square with that very human desire to share the experience of what’s current?

Fashion has a short memory. According to Gartner’s latest figures Nokia may remain market leader in terms of units shipped, but it...

D Thomson | 08 Jun 2011 | 0 comments

As I meet Symantec customers and partners to talk about some of the impacts that virtualization, mobile and cloud computing are having on their businesses, I hear time and time again about the importance of information and about the fact that the governance and securiy policy that surrounds information will be key to ensuring successful transitions to new computing and service delivery models.

In almost every case, though, the organisation that I am speaking to is (fundamentally) struggling with the same problem.... Where on earth do I start with all of this ?

I hear a lot of potential answers to this question ("data classification", "virtualization", "service level agreements", "data loss prevention" etc..). For me, these are all too technical and specific as a first step. In my training (a good few years ago now) in the business of Risk Management, I was taught that any programme of radicial transformation (...

Jon C | 24 May 2011 | 0 comments

In this industry it's not so hard to spot the changes as they happen: what's harder is to do something about them, given what's already in place. Technology is presenting organisations large and small with new opportunities, but also creates new challenges and pressures which might be easy to fix if those in charge had the chance to start with a clean sheet of paper.

Nowhere is change having more impact than in security and risk management. When the Jericho Forum was set up in 2004, its goal was to look at the challenges faced around 'de-perimeterisation' - that is, what does security need to become when the perimeter of the organisation starts to weaken based on how people are using IT? A question which has become a self-fulfilling prophecy.

Seven years later, for many organisations the perimeter has gone completely. Cloud computing, the umbrella term we use to describe internet-based applications and services, has arrived on the technological...

Symantec Analyst Relations | 23 May 2011 | 0 comments

Welcome to the new Symantec Analyst Relations Community site.

Be sure to watch the Welcome Video from Kevin Bailey, Global Market & Analytics Strategies

Symantec Analyst Relations | 10 May 2011 | 1 comment


Symantec Vision 2014 Las Vegas

Watch an exciting Day One Keynote with Mike Brown, Interim President and Chief Executive Officer, Stephen Gillett, Executive Vice Presidenta and Chief Operating Officer, Jason Latimer, Illusionist and others at Symantec Vision 2014 Las Vegas.


Meet our Executives & Experts ‘face to face’

Mobile payments are on the rise, but how safe are they?

Watch the interview with Symantec's VP Mobile Product Management Michael Lin here

Strong Authentication Solutions...