Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrade.
Please accept our apologies in advance for any inconvenience this might cause.

Symantec Analyst Relations

Showing posts in English
GregDay-SecurityCTO | 22 Aug 2012 | 0 comments

There is often talk of the growth in mobile threats and, in 2011, we saw significant growth, in terms of volume as a percentage. Yet, as a total of the numbers involved, these were still relatively small – in the thousands, rather than hundreds of millions that unleashed themselves on the PC last year.

At the same time, we did see far greater innovation in the nature of mobile threats, with attackers focusing in on finding vulnerabilities to exploit, such as the botnet concept, as well as where money can be made and information stolen through smart devices.

So what is the right way to manage that threat and soften its impact?

Let me start by looking at process – and please bear with me as I do. In the past 10 years, the cost of a laptop computer has plunged by a massive 90%, while already it’s...

Sridhar Ramanathan | 20 Aug 2012 | 0 comments


While consumer-accessible, hosted storage is nothing new, it was in the wilderness a number of years before reaching the mainstream. Early offerings from the likes of now-defunct X:Drive seemed great in principle, offering 5Gb in storage which (back in 2006) sounded like all anyone would ever need. But for one fatal flaw - the bandwidth simply wasn't there. Neither homes nor mobile devices had sufficiently fast throughput capabilities for online storage to be usable. 


Half a dozen years later, we can see a very different picture. The consumerisation phenomenon is in full swing, with employees preferring to use their own mobile phones, access online applications that they choose, and indeed make use of hosted storage now that the bandwidth barriers to entry have been removed.


While consumerisation is a frequent topic of discussion however, it is normally...

Symantec Analyst Relations | 08 Aug 2012 | 0 comments

The July edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used to compile the analysis for this report includes data from January through June 2012.

Report highlights

  • Spam – 67.6 percent (an increase of 0.8 percentage points since June)
  • Phishing – One in 475.3 emails identified as phishing (a decrease of 0.003 percentage points since June)
  • Malware – One in 340.9 emails contained malware (a decrease of 0.023 percentage points since June)
  • Malicious Web sites – 2,189 Web sites blocked per day (an increase of 4.0 percent since June)
  • Olympic related scams and threats to keep an eye on
  • Web attack toolkit activity in the first six months of 2012
  • A roundup of the best blogs of the last month...
Sridhar Ramanathan | 06 Aug 2012 | 0 comments


The term ‘file sharing’ evokes a variety of emotions. Clearly, sharing documents and other content between peers is a useful thing to be able to do, particularly in the corporate context. Equally illegal downloads, Napster and Pirate Bay, torrents and warez, file sharing has all done their best to give this most basic of computer functions a bad name.  


Despite corporate file sharing tools being around for some time, this is perhaps why they have only recently become a more accepted part of the corporate IT tool kit. Few would doubt their usefulness, for example for exchanging very large files, collaborating on documents or distributing up-to-date versions of information. All very useful functions, but as with any technology, IT decision makers need to think carefully about the associated risks. 


Perhaps the biggest of these is data leakage. Shared folders appear like normal folders on a...

Sian John | 06 Aug 2012 | 0 comments


Contingency planning is a necessary evil. Like dental checks or car servicing, it gets in the way of doing more useful things such as - in business terms - actually making money or delivering services. All the same, there is never a bad time to have a think about what might go wrong, and put measures in place that can either mitigate the risks, or minimise the potential damage. 

Indeed, when it comes to information systems - some of which will inevitably store customer data - most organisations have no choice given data protection law. An added complication is how to decide what actually constitutes a valid risk, however. While some threats seem genuine - a 'clear and present danger' if you will - others fall into the category of problems that only happen to other people. 

Distributed Denial of Service attacks are a case in point - that is, attacks which prevent computer systems or web sites form being accessed. In the past, DDoS was...

D Thomson | 02 Aug 2012 | 0 comments

As discussed in previous blogs the topic of the “information explosion” seems to be top of mind for many IT execs today (unstructured data being the chief protagonist responsible for data growth in most companies). Many IT organisations have, until now, relied on the collapsing cost of storage as a risk mitigation technique & “band-aid” strategy (“well,  disks are no longer costing what they used to so we just broker very cheap deals and add racks to the datacentre”)..

This somewhat tactical and short-sighted approach has its obvious short-comings.. For one, 2002 was the last year in which disk price performance kept up with information growth. Secondly, all this “cheap” disk needs somewhere to live (and it needs to be cooled, powered, administered…).

It is predicted that the growth of data will be 800%, with 80% unstructured data in the next 5 years. While enterprise data is growing at a rate of 40% to...

Symantec Analyst Relations | 25 Jul 2012 | 0 comments

"Sometimes I like to think of Symantec as an elephant," said Angela Tucci, Symantec’s chief strategy officer, over lunch at London’s Soho Hotel. "Depending on which side of the elephant you look at," she explained, "you get a completely different perspective of the creature."

Read the following interview with Angela Tucci, Chief Strategy Officer at Symantec on her views around Mobile, Cloud, Virtualization, strategic acquisitions and rebranding Symantec here

Neal Watkins | 22 Jul 2012 | 0 comments

St. Paul’s Cathedral has dominated the London skyline for more than 300 years, while almost everything around it has changed. From the street to the Shard, the traffic to the tourists, it’s all new, while the Cathedral has stayed the same. The same is true of the data that dominates our lives.

Although you might think data is constantly changing, it remains the one invariable in a dynamic IT landscape. Anyone the wrong side of 40 will remember the different eras of IT. First we had the mainframe period, then the dawn of the PC, followed by the brief, bright light of client/server computing. Next came the Internet and collaborative computing. Throughout the last 30 years, the bedrock of all those eras has been data. Yes, there’s more of it—unstoppable amounts in fact—but it’s always been there, always needed to be protected, secured, and kept available.

Right now, we’re in the post-PC era, where everything is Cloud-enabled, and...

GregDay-SecurityCTO | 18 Jul 2012 | 0 comments

While the BBC recently reported the existence of Shodan, a searchable online database of Internet-connected control devices, the fact is that the site has been around for a couple of years now. Shodan holds information about every type of system from standalone computers to industrial scale equipment controllers, such as the Dutch canal control system mentioned on the BBC report.

Shodan isn't the only kid on the block. The "Every Routable IP Project" (ERIPP) aims to build a database of every internet-accessible device - a seemingly innocuous goal. While the existence of such search engines may not be 'new' news, it is certainly worth broadcasting the fact they are still seen as relevant as they offer a shockingly useful resource. With relatively little experience or...

D Thomson | 13 Jul 2012 | 0 comments

The industry is buzzing right now with talk of “the information explosion”. In talking to customers and digging a little deeper, it seems that the trend of unmanageable and extreme data growth is largely the fault of “unstructured data” (email, video, social media, backups, powerpoint are all cited regularly is chief culprits).

Whilst an exponential growth in data and the storage devices necessary to store it are clearly in need of revised and sometimes disruptive new approaches, I can’t help but think that a “back to basics” philosophy might also be appropriate in many cases.. You remember, good old-fashioned IT service management discipline that we were told years ago would bring our IT shops into line (and that most of us never quite got around to implementing).

On recent visits to our customers and in discussing their current storage and “information explosion” nightmares, we have (in almost every case) needed...