Video Screencast Help
Symantec Analyst Relations
Showing posts in English
PFN | 23 Jul 2013 | 0 comments

Welcome to the first entry in my new blog, designed to provide the industry analyst community covering Symantec with occasional updates on our company. I’ll try to make these communiqués quick, informative and a little less dry than an Asahi Beer ( a personal favorite, right up there with Tiger Beer from Singapore). But I digress. Today I’m sharing a recent Forbes article written about Symantec’s Chief Operating Officer, Stephen Gilllett, at the heart of much change at Symantec. There’s also an update on soon-to-come product roadmap updates and our upcoming earnings call. For those of you who saw this update via email, excuse the redundancy, but I do appreciate the loyal following. Please let me know what you’d like to hear from us. Cheers.

Forbes Article on Symantec COO - Although Symantec CEO Steve Bennett is the name most associated with the changes taking place as part of Symantec 4.0, Chief Operating Officer...

D Thomson | 02 Jul 2013 | 3 comments

The current business and consumer landscape is evolving fast. Information volumes are growing, regulations are tightening, attacks are becoming more sophisticated, organisations and people are raising expectations on what technology can do for them. 

As a result, the way we think about IT is being forced to evolve. New technologies - virtualisation and cloud, social and mobile - bring new opportunities but, at the same time, cause new issues and risks. 

We see these challenges across our customer base. Storage issues in virtualised environments, information sprawl across physical, virtual and cloud environments, fragmentation risks to traditional security models, uncontrolled use of mobile devices, difficulties of brokering and controlling cloud services… the list goes on. 

Many, if not all IT departments have little choice but to "get with the new" in order to cope with the consequences, even as they manage...

Straners | 02 Jul 2013 | 0 comments

What every business wants and strives for is IT Service Availability at lower cost. But how you achieve this is a challenge that really concentrates the mind. Moving forward, a triple alliance between Physical, Virtual and Cloud will be the route that most organisations choose to deliver against their availability goals. The big test is deciding which service you should put into what ‘bucket’ of this alliance.

Let’s start off by thinking about business-critical services. These require availability and protection at all times, regardless of whether they reside on a physical server, a virtual machine or potentially both. It is easy to create new virtual machines; it’s not so easy to manage them when too many are generated. On top of that, what are the aggregated server management costs? While the lure of life in the Cloud will supposedly remove capital investment, who actually pays the ‘Cloud bill’ at the end of the month? Getting the...

Sian John | 17 Jun 2013 | 0 comments

Should security-conscious businesses be running applications in the cloud? In addition to frequently cited concerns (data sovereignty, management console points of failure and so on), the nature of cloud models has a number of architectural, and therefore security implications.
 
Cloud-based applications are by their nature distributed, benefiting from elastic infrastructure (processing, memory and storage) which can be scaled according to demand. Applications built for the cloud are increasingly architected based on the principle that hardware failure may (and sometimes does (http://www.policymic.com/articles/10526/amazon-crash-causes-instagram-and-netflix-to-blackout-is-cloud-computing-ready-for-prime-time)) happen.
 
From...

bjornengelhardt | 29 May 2013 | 0 comments

by Bjorn Engelhardt, VP, Strategic Sales & Cloud – Asia Pacific and Japan, Symantec

Recently, myself and our new Symantec AR manager for APJ, Sancharini Mazumdar, ‘met’ online with a number of our key regional analysts to offer some insights into Symantec’s latest announcements and provide an update on the ‘Symantec Vision 2013’ for the region. Much of this vision is about solving customers’ largest unmet and under-served needs, while reducing complexity and increasing simplification.

This is all very much part of the revolution taking place within Symantec right now, the core of which is based on delivering more value for our customers – whether they be consumers, small businesses, large enterprises or countries all around the world. What will this revolution be based on? Most importantly, the goal of better meeting customer needs through internal innovation and driving faster organic growth. And it’...

Straners | 21 May 2013 | 0 comments

HOW TO AVOID THE DARK CLOUDS

 

It isn’t hard to see why Cloud-Based IT Services are becoming such a big draw for businesses – not when cloud is attracting more and more focus, as organisations seek out the best, and most efficient and cost-effective means of storing their essential (and often highly sensitive) data.

One question I’m asked time and again, though, is how fast is the move into the Cloud? You hear all sorts of stats and claims, so it’s time to put a bit of reality around this. If you look at our own latest in-depth survey on this here at Symantec – ‘Avoiding The Hidden Costs of the Cloud’ – it’s clear that customers really are rushing to leverage cloud services, as they extend the reach of their IT deep into the stratosphere. In fact, more than 90% of all organisations are at least discussing Cloud – a sharp...

Symantec Analyst Relations | 14 May 2013 | 0 comments

This Blog was originally posted on In the Personal Cloud

Last November, we announced the beta version of Norton Zone, a new cloud file sharing service that allows users to safely and easily share the content that matters most. Today, I’m very pleased to announce Norton Zone is out of beta – stronger, faster and easier to use than ever. Also beginning today, users in the United States can buy additional storage, to expand the 5GB they continue to get for free.

The staggering growth of cloud services, mobile devices, and the social imperative to share anything is creating unique challenges. Almost all facets of our daily lives are “going digital,” and content is being created and shared in...

Robert Mol | 13 May 2013 | 0 comments

 

Creating competitive advantage by realising customers’ unmet and under-served needs is the goal of any progressive business. But you cannot achieve that in any meaningful way, unless you have a strategy that turns those customers into long-term, loyal and committed ones. In other words, believers in the solutions you design and offer them.

It is these principles that Symantec adheres to and has embraced in its 2013 Strategic Direction Plan, focused on three critical areas also defined as the 'Peaks' against which 'right for the customer' offerings are designed:

  • User Productivity & Protection
  • Information Security
  • Information Management: Availability & Scalability.

Importantly, this strategy has not emerged from any ‘deep bunker’ thinking, but from constant engagement with, and feedback from, customers and partners on precisely why they have opted for Symantec’s solutions...

Sian John | 02 May 2013 | 0 comments

A few weeks ago, online tech news site The Verge reported a security hole with Apple’s password reset software. All you needed to reset an Apple Id, it said, was a valid email address and date of birth. In this day and age, with personal details proliferating across the Web, it’s not hard to imagine how to get hold of either. 

The shame, perhaps, for Apple, is that the company was in the middle of implementing two-factor authentication for its mobile devices. To add insult to injury the registration process was three days, leaving anyone concerned about the security hole vulnerable to attack. 

On the upside, the breach has now been closed – it is no longer so easy to hack an Apple Id. However the situation does paint a stark picture of the state of play today, which brings together a...

Symantec Analyst Relations | 24 Apr 2013 | 0 comments

2013 Internet Security Threat Report, Volume 18

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

Key Findings

  • 42% increase in targeted attacks in 2012.
  • 31% of all targeted attacks aimed at businesses with less than 250 employees.
  • One waterhole attack infected 500 organizations in a single day.
  • 14 zero-day vulnerabilities.
  • 32% of all mobile threats steal information.
  • A single threat infected 600,000 Macs in 2012.
  • Spam volume continued to decrease, with 69% of all email being spam.
  • The number of phishing sites spoofing social networking sites increased 125%.
  • Web-based attacks increased 30%.
  • 5,291 new...