Video Screencast Help
Vision User Conference Blog
Showing posts tagged with Symantec Vision
Showing posts in English
BenjiHertel | 04 May 2011 | 0 comments

Sieze the Phone

 Unknown Object     Las Vegas, NV, some people come here to find fame, some to find fortune, some just to find a good time...I came to Vegas for none of these things, no really, I came to Vegas to learn more about Symantec at their annual Vision Conference. Here you can come to a single event and learn about hot topics like: System Management, Backup, Data deduplication, Virtual Applications, Virtual Machines, Enterprise Security, and so much more.  All of it under the Symantec umbrella, one that until recently I may have had some distaste for. Ladies and Gentlemen I implore you...look again...this isn't Norton, this isn't Veritas, this isn't even Altiris...this is all of the above and way more than I knew about. One aspect of Symantec I hadn't thought a lot about until today is...

Benjamin Fuller | 04 May 2011 | 0 comments

Mobile Devices; Ready or not, here they come!

Mobile devices are becoming more and more popular in today's world due to their sleek designs and growing capabilities. Organizations need to start preparing themselves to secure the company sensitive data their users are demanding to use on these devices.

 

What can you do to prepare for these devices and implement them in your environment safely and secure the data that gets put on them?

The answer may not be as hard as you thought this would be. There are multiple answers for how to do this depending on how many priveleges you decide to let your mobile users have.

Only allowing email on mobile devices? Consider the following;

  • Cloud services can host your email and allow access from mobile devices securely and safely with encryption as well.
  • Web mail is another option to implement and most organizations current have this in place already.
  • Email could be...
Jason_Wilson | 04 May 2011 | 0 comments

Mobile Security podcast:
http://www.symantec.com/podcasts/detail.jsp?podid=...

IMHO, organizations need to realize that there's a great deal of benefit to be had with mobile devices, but their policies need to address safeguarding their data on the platform. The convenience mobile devices provide are worth the cost and effort to implement a policy which allows their use when properly protected. Such protection should include encryption of company data and the ability to lock / wipe only the company centric data / functionality.

Vision 2011 was my first Symantec conference. I had no idea there was so much knowledge and information to absorb. Four days is just not enough! If I had to pick one important thing I learned at Vision 2011, it would be that I am not alone. There exists a...

Mark Maynard | 04 May 2011 | 0 comments

 

Caesar Photo

http://farm6.static.flickr.com/5181/5681413329_da2...

Podcast Link

http://us.norton.com/products/library/article.jsp?...

There are many concerns for an enterprise when considering how and when to use mobile devices such as mobile phones or tablets.  Do we let users provide their own devices?  Do we provide the devices for them?  what is the best device for the job and demands for and from the user?  All of these considerations and many more must come into play when introducing and upgrading devices in the enterprise environment.   Policies must be able to protect the companies...

Yunsun Wee | 04 May 2011 | 0 comments

You can’t argue the positive potential impact of social media to an organization. It’s allows a company to have conversations with current and potential customers, helping to sway buying decisions. It helps to build relationships, brand trust and ultimately helps to create advocates for a company’s brand.

Social media ever present and simply blocking is no longer an option.  As IT professionals, you’re going to have to effectively manage the challenges of social media in the workplace and ensure that corporate data is protected and stored to comply with new government regulations. 

But how do you make sense of all it? For those you who missed our Vision session: How Social Media is Influencing Your IT agenda, here's a quick recap of the regulations we reviewed.

FINRA:The Financial Industry Regulatory Authority provided guidance on applying their communications rules to social media sites. FINRA released...

Rae Landua | 04 May 2011 | 0 comments

Altrinsic Solutions leads the hardware independent imaging market with DeployExpert (DX), a systems management platform plug-in that enables highly automated deployment and migration services for Windows 7, Windows 2008 as well as legacy Microsoft operating systems.  With DX, your Hardware Independent Deployment (HID) process is no longer limited to or reliant on IT staff's ability to integrate and maintain various tools and resources. Within just a few hours after install, DX enables an automated deployment process that has been proven in hundreds of organizations including numerous Fortune 500 enterprises worldwide.

DX is already making life easier for many OSD administrators according to Stephen Holcomb, CEO of Altrinsic Solutions, “We are getting great feedback from our customers that the DX technology is finally making significant OS Deployment automation a reality.”  With comprehensive automation and ease of use on standard, supported...

ThePuya | 04 May 2011 | 0 comments

 

"Et tu, Brute? These should not be your last words when you realize that your mobile phone has betrayed you as a result of a lack of security on your mobile device.

Here are some of the primary security issues surrounding mobile devices and offers ideas on how enterprises can address them:http://www.symantec.com/podcasts/detail.jsp?podid=ent_1012_Mobile

As more employees are given mobile devices, it’s been easy to say, “We need a phone for this person,” without giving a lot of thought to the costs, security, and support. A process for giving employees phones must be implemented. For example, when someone requests a mobile device, the request should be approved by a supervisor and the CIO to provide two layers of authorization. There needs to be a...

Melody Sutton | 04 May 2011 | 0 comments

 

Photo of Julius Caesar from the fabulous Caeasar's Palace in Las Vegas

 

 

Here is a fabulous link to the podcast on a feature for mobile security.

 Enlightened Mobile Security 

 

 

 

What organization can do better for mobile devices

As mobile devices become more common in the workplace; organization can do better in the creation of their mobile device policies by working on the following items. First, ensure users are trained in security, cost effectiveness, policies, and require passwords for all devices. Encourage a strict policy for your company to limit the types of devices so they are managable, cost effective and detailed training can be provided on the devices. Most importantly...

Yunsun Wee | 04 May 2011 | 0 comments

Yesterday morning Enrique Salem, Symantec’s president and CEO, challenged IT professionals to rethink their approach for securing and managing information and identities. Kicking off Symantec’s Vision 2011 Conference, Salem talked about the explosive growth in information and other trends that are driving this shift in IT. First, information today is everywhere and last year alone grew 62 percent to 800,000 petabytes Information no longer resides behind the walls of a data center. Instead, it is stored and accessed from a variety of mobile devices and the cloud. Protecting, storing and managing all of this information is a challenge so IT needs to determine which information is most relevant. At the same time, today’s attacks are more targeted and toxic and attackers are focused on stealing information from individuals and businesses. Virtualization and the cloud provide a tremendous opportunities and need to think about how to ensure those environments are as...

LeslieMiller | 04 May 2011 | 0 comments

Vision continues today with classes, keynotes, and labs but ends with a huge User Appreciation Party. What could be better? We don't know yet, but we're working on it for tomorrow!

Keynote Update

If you were here for yesterday's keynote, you were educated and entertained by an outstanding line-up of Symantec executives, Vision sponsors and other special guests. Among other things, you learned about Symantec's vision and strategy, got the scoop on the virtualization megatrend and looked inside the new V-Ray™ technology.

So what's in store for this morning's keynote? Even more cool stuff! You'll learn about the new Enterprise Vault 10 and mobile security, and you'll have a chance to hear from special guests Richard McCormack, Senior VP, Platform Marketing from Fujitsu and Tom Maloney, Director, Corporate Software Sales...