Video Screencast Help
Symantec Analyst Relations
Showing posts in English
D Thomson | 18 Dec 2012 | 0 comments

How much value can be placed on trust in business? "It takes many good deeds to build a good reputation, and only one bad one to lose it," said Benjamin Franklin, and indeed companies go to huge lengths to build and maintain trust relationships with both their customers and the wider market.

The simple reason for such effort is that a trustworthy business is a profitable business. We don't need to read the management textbooks to get this – people buy from people they believe can deliver. It’s why we set so much store by personal recommendation and, should things go wrong, we may avoid buying from the same place again.

Projecting an image of reliability is good for the bottom line - backed up, of course, by actually being reliable. Both products and services should meet or exceed expectations, and customers should not have any surprises about how the organisation behaves...

Symantec Analyst Relations | 14 Dec 2012 | 0 comments

It seems that everywhere you turn this year, there’s news of another data breach. Sometimes it’s a laptop stolen, other times it’s hackers compromising a database. No matter how they occur, each breach leads to someone’s identity being exposed. Whether or not this exposure leads to identity theft, there’s no doubt that the risk involved, and the frequency that these breaches are occurring makes data breaches one of the top security issues of 2012. Read more

 

Symantec Intelligence Report: November 2012 - A look at identities lost in data breaches; Holiday spam

The November edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The...

GregDay-SecurityCTO | 10 Dec 2012 | 0 comments

IT Security is, at its core, just another kind of risk management. The principles are straightforward to explain – identify the risks, their probability and impact, then work out suitable mitigation strategies to reduce one or the other. 

So, how hard can it be to 'deliver' IT security - that is, to make an organisation's IT environment secure? Very hard, is the answer, when we consider just how far technology has come since such principles were first documented. The main challenge can be to identify the risks in the first place, against a background of constant evolution and sudden change.

And it's not going to get any easier given that threats come from an increasing variety of places. Let's summarise - mobile devices and networks; cloud-based applications, services and infrastructure; social networks and online collaboration tools; email and documents; virtualised...

Symantec Analyst Relations | 28 Nov 2012 | 0 comments

by John Brigden, SVP EMEA

This blog was originally posted in Information Unleashed.

Imagine half the value of your business being buried out of sight; or that value residing on the devices your employees took home at night, possibly to be lost or damaged. It’s a sobering thought—and one that’s all too real in today’s digital world.

According to the Symantec 2012 State of Information Report, almost half (46 percent) of an organisation’s information is being stored outside of its own data centre on devices beyond the corporate firewall. That could be anything from confidential customer information and sales opportunities, to crucial emails and financial reports. This ‘information sprawl’ is like setting a match to your business.

In the report, information sprawl was identified as the culprit in more than one-...

Symantec Analyst Relations | 16 Nov 2012 | 0 comments

This blog was originally posted in Symantec Intelligence

from Paul Wood, Cyber Security Intelligence Manager

In this month’s report we investigate a new social networking avenue that scammers are attempting to leverage: Instagram. They’re doing so in order to gather personal details and persuade users to sign up for premium-rate mobile services, among other things, generally by creating fake accounts:

The scams take on a number of forms, from spam comments, to fake followers, to liking photos in the hopes people will check out their profiles, which in turn often contain more spam links.

We’ve also noticed a significant drop in email spam volumes this month. The global spam rate has dropped by more than 10%, from 75% of email traffic in...

Symantec Analyst Relations | 13 Nov 2012 | 0 comments

This blog was originally posted in Information Unleashed.

Symantec’s first State of Information report examined how organizations are dealing with information today, in light of significant changes in the data center. Symantec’s Digital Information Index sheds light on where information is being stored today, as well as some of the challenges that businesses are dealing with as a result of this transition in the way we store and access our information.

Information is moving from traditional storage in data centers to devices outside of the corporate firewall. This new category of unorganized, duplicative information is referred to as “information sprawl.” Symantec’s Digital Information Index provides a barometer for information sprawl in different areas of the world. The Index shows that in certain growing...

tzambrovitz | 01 Nov 2012 | 0 comments

Ask anyone who has worked in IT for any length of time, and they will tell you the devil is in the detail. While a product might look great on paper or as part of a well-rehearsed demo, post-deployment the grass may not be so green. Frequently, the biggest issues with implementations or upgrades are caused by integration with technologies already in place. The more embedded a product is in the infrastructure, the more likely it is to hit challenges.

As Symantec is, essentially, a purveyor of infrastructure products and services, we are acutely aware of such issues – indeed, it is our business to help organisations of all sizes reduce the risks that they cause. And given that no technology has had a bigger issue on IT infrastructure over the past decade than virtualisation, we have made it our business to help organisations address that, too.

At VMworld this summer, we announced no fewer than...

Symantec Analyst Relations | 22 Oct 2012 | 0 comments

By Johnny Karam, Regional Director Middle East

This blog was originally posted in Security Community Blog.

It is day three of GITEX and I’ve been talking from morning to night with CIOs, IT executives and partners. But I’m not tired...I’m actually energised. Energised because now more than ever before I am seeing how Symantec is an integral piece of the puzzle at the heart of Middle East organizations – and that is exciting!

In making the rounds at this premiere IT event for the Middle East, one of the resounding subjects in every discussion has been cyber security threats. The recent blaze of high profile attacks in the region has brought to life the growing concern and deeper awareness of the threats that organisations are facing today and how to protect their information and minimize the risks from undue...

Marie Pettersson | 10 Oct 2012 | 0 comments

BYOD is hot! However, as our recent mobile product and program news highlights (http://bit.ly/T1CMTC), there is still a lot more to enterprise mobility. Companies need to understand their total mobile story, of which BYOD will likely only be one part. The reality is that any given organization will likely need multiple mobile deployment and support models. Listen to the Podcast to learn more: http://bit.ly/QaYgif

 

 

DLamorena | 09 Oct 2012 | 0 comments

Imagine the scene: a free-standing data center is perched precariously on the ledge of a building, 250 feet off the ground. It hovers there momentarily – and then plummets through the air, landing at a speed of 120ft/sec, with a deafening crash.

Seconds later, with the debris of the wrecked DC scattered in all directions, a second, identical data center, up on that same roof, effects a full recovery of the data and application. Symantec’s experiment in disaster recovery has been a resounding success.

The point being that businesses need 24/7 availability of their data and applications to keep their operations running smoothly and customers happy – which puts a major strain on organisations to maintain that level of service constantly.  Not only must they be ready for the worst case scenario of their data centers suddenly being out of action. They need to be able to recover the situation – fast.

It was with this in mind that Symantec...