Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
D Thomson | 26 Mar 2013 | 0 comments

 

Sometimes when we stop and think about how the world is changing, we realise that it already has.

From Symantec’s perspective, as we have learned from our many conversations with customers large and small, nowhere is this more apparent than in IT service delivery.
 
Delivering IT services was never simple, but at least it was linear. Traditional IT departments follow a command-and-control approach: strategy, procurement and related decisions have been made centrally and delivered out to business departments. This model is changing however, driven by factors coming across from business departments and up from the individuals that staff them.
 
Business divisions are unquestionably taking more control over the technologies they depend upon. What we used to know as “shadow IT” – procurements taking place without the knowledge of IT – is emerging from the gloom ...

Symantec Analyst Relations | 18 Mar 2013 | 0 comments

The February edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through February 2013.

Report highlights

  • Spam – 65.9 percent (an increase of 1.8 percentage points since January)
  • Phishing – One in 466.3 emails identified as phishing (an increase of 0.018 percentage points since January)
  • Malware – One in 408.2 emails contained malware (a decrease of 0.11 percentage points since January)
  • Malicious websites – 1,530 websites blocked per day (a decrease of 32.2 percent since January)

Introduction

In the past month we‘ve discovered of the earliest known...

Symantec Analyst Relations | 14 Mar 2013 | 0 comments

by Phil Nash, Director Analyst Relations

As many commentators have pointed out over the years, Symantec has been built on two pillars, responding to the needs of both corporations and consumers. While this model has served us well it has sometimes added complexity. 

Even more importantly however, the world, and therefore the environment within which we work, has changed. The line between consumers and businesses is becoming ever more fuzzy: whether or not companies are giving employees budget for technology purchases, across the board people are using their own equipment, software or online services in the workplace.

The phrase “consumerization of IT” has been coined to describe this phenomenon. Equally however, we’re seeing the IT-ization of consumers. People are generally becoming more tech-savvy and, in parallel, less tolerant of what they see as inadequate technology. In parallel, the resulting loss of control is...

GregDay-SecurityCTO | 08 Mar 2013 | 0 comments

The Internet of Things (IoT) took another step forward, as standardisation body OASIS formed a committee to enable the adoption of Messaging Queue Telemetry Transport (MQTT) for machine to machine (M2M) communications. 

MQTT is a small-footprint messaging protocol designed to enable low-power devices to exchange information. Such standards matter as they accelerate technology creation and adoption, by reducing development costs and increasing interoperability. In layperson's terms, the easier it is for devices to talk to each other, the more they will do it.

IoT is very interesting to us at Symantec, most importantly because it will have a dramatic impact on the way we all use technology. The EU's Neelie Kroes suggested that up to 50 billion devices could be connected to the Internet by 2020, from pallets to fridges. Indeed, the number of '...

D Thomson | 15 Feb 2013 | 0 comments

It’s interesting to me that many IT organisations that I speak to now have started to realise that “infrastructure” may no longer be king.

If I think about the projects and strategies that I was working on 5 or so years ago, almost all project focus (time, effort and money) was directed specifically at IT “plumbing”…. “We need to implement archiving, let’s buy some storage and a bit of software”, “our business is asking for highly available systems, let go build a second datacenter”.

One of my favourite IT books of the past decade and one that many will remember was, “Does IT Matter?” by Nicholas Carr (here). This thought provoking (and seemingly controversial) work discussed the idea that, in all industries, infrastructure...

Neal Watkins | 12 Feb 2013 | 0 comments

Symantec released its  2012 Corporate Social Responsibility (CSR) report at the end of October. It’s not for any company to make the final judgement on how well it rates in terms of CSR, but you can read independent reviews from environmental analysis firm TriplePundit and Ethical Corporation.
 
From the top, the report divides into three sections. Our People, which covers how Symantec develops as an inclusive, diverse organisation; The World, tackling how the company minimises its footprint and maximises its positive social impact; and Your Information, which specifically...

Sian John | 11 Feb 2013 | 0 comments

There is a lot of fear out there when it comes to dealing with the cloud, especially with so much hype surrounding the technology. However, what you do, and do not, commit to the public cloud is entirely your call.

To misquote George Orwell’s classic, ‘Animal Farm’: ‘All clouds are equal – but some are more equal than others’. The other key thing to remember is that not everything is for the cloud, so it’s a matter of each to its rightful place.

Information highly sensitive? Then use private clouds, so that you benefit from scalability and flexibility internally, without exposing your data to the Internet. Consider which are your crown jewels of information and what protection you have around these. Is it good enough? Should those defences be more robust?

The starting point is to look carefully at each workload when deciding which kind of cloud your data should be in. The relative merits of issues such as availability,...

Symantec Analyst Relations | 24 Jan 2013 | 0 comments

Symantec's CEO, Steve Bennett, on January 23rd outlined the company's priorities in addressing the unmet needs of customers to fully protect, move and manage information on multiple devices. Symantec will focus on enabling customers to keep their digital lives safe and protected through a renewed emphasis on innovation and developing new technology. Please visit the resources below for more information

New coporate strategy overview and landing page

Press Releases

Symantec Analyst Relations | 16 Jan 2013 | 0 comments

In December’s Symantec Intelligence Report we take a closer look at our worldwide stats on the threat landscape. For the month of December, the United States claimed the dubious honor of being the largest source of spam at 12.7%, phishing scams at 24.2%, and virus attachments at 40.9% globally. It’s not unusual for the US to top one or two of these three categories, though claiming the triple crown of risk-based distribution is a little less common.

In other country news, Norway has jumped up to become the most targeted country for phishing attacks, as we’ve determined that 1 in 81.4 emails in the country were phishing attempts in December. Norway also came in second biggest source country, distributing 20.2% of all worldwide phishing attacks. The reasons why one country would jump like this are often varied, but likely due to a concerted phishing campaign by attackers. We’re keeping an eye on...

Gerry Egan | 14 Jan 2013 | 0 comments

Microsoft’s latest desktop operating system release has been applauded as the most secure Windows ever – incorporating features including anti-malware out of the box, boot protection against rootkits and support for self-encrypting drives. So, does this mean we no longer need to think about Windows desktop security?

That the answer is (of course) “no” should not be taken as a comment on the strides Microsoft has made. Rather, it is more an indicator of where the boundaries now lie. To state the most obvious point first, no operating system can ever be 100% secure – indeed, security company Vupen claims to already have done just that.  

Even if an operating system proves resistant to attack, the bad guys know that the weakest link is the ‘human layer’ – that is to say, the people...