Video Screencast Help
Vision User Conference Blog
Showing posts tagged with #Symanteccontest
Showing posts in English
LeslieMiller | 28 Sep 2011 | 0 comments


The VISION SOCIAL MEDIA SCAVENGER HUNT CONTEST (the “Contest”) is sponsored by Symantec Limited of Ballycoolin Business Park, Blanchardstown, Dublin 15, Ireland (“Symantec”). The Contest begins on Tuesday, October 4, 2011 at 11:00 a.m. Central European time and ends on Tuesday, October 11, 2011 at 11:00 a.m. Central European time.


This Contest is open to persons who are registered participants at VISION 2011 in Barcelona held on 4-6 Oct, 2011 and are legal residents in the EMEA Territory as defined in Section 9 below. Entrants must have reached the age of majority in their state or province of residence at the time of entering the Contest in order to participate, must not be employed by a governmental body and must have obtained the permission of their employers to participate in this Contest. Persons in any of the following categories...

LeslieMiller | 05 May 2011 | 1 comment

Congratulations to the winners of the Vision Social Media Scavenger Hunt.

Day 1: Cheshana Marshall, Case Western Reserve University for the entry Application level virtualization and security. Che Che wins an Apple iPad.

Day 2: Benjamin Fuller, Amkor Technology for the entry Cloud Challenges. Benjamin wins a Xoom.

Day 3: Melody Sutton, Latta Harris Hanon & Penningroth for the entry Vision 2011 Scavenger Hunt Day 3. Melody wins an Apple iPad

Winners were announced at the Closing Keynote today at Vision Las Vegas. However, individuals did not need to be present to win.

BenjiHertel | 04 May 2011 | 0 comments

Sieze the Phone

 Unknown Object     Las Vegas, NV, some people come here to find fame, some to find fortune, some just to find a good time...I came to Vegas for none of these things, no really, I came to Vegas to learn more about Symantec at their annual Vision Conference. Here you can come to a single event and learn about hot topics like: System Management, Backup, Data deduplication, Virtual Applications, Virtual Machines, Enterprise Security, and so much more.  All of it under the Symantec umbrella, one that until recently I may have had some distaste for. Ladies and Gentlemen I implore you...look again...this isn't Norton, this isn't Veritas, this isn't even Altiris...this is all of the above and way more than I knew about. One aspect of Symantec I hadn't thought a lot about until today is...

Jason_Wilson | 04 May 2011 | 0 comments

Mobile Security podcast:

IMHO, organizations need to realize that there's a great deal of benefit to be had with mobile devices, but their policies need to address safeguarding their data on the platform. The convenience mobile devices provide are worth the cost and effort to implement a policy which allows their use when properly protected. Such protection should include encryption of company data and the ability to lock / wipe only the company centric data / functionality.

Vision 2011 was my first Symantec conference. I had no idea there was so much knowledge and information to absorb. Four days is just not enough! If I had to pick one important thing I learned at Vision 2011, it would be that I am not alone. There exists a...

Mark Maynard | 04 May 2011 | 0 comments

Caesar Photo

Podcast Link

There are many concerns for an enterprise when considering how and when to use mobile devices such as mobile phones or tablets.  Do we let users provide their own devices?  Do we provide the devices for them?  what is the best device for the job and demands for and from the user?  All of these considerations and many more must come into play when introducing and upgrading devices in the enterprise environment.   Policies must be able to protect the companies data as well...

ThePuya | 04 May 2011 | 0 comments

"Et tu, Brute? These should not be your last words when you realize that your mobile phone has betrayed you as a result of a lack of security on your mobile device.

Here are some of the primary security issues surrounding mobile devices and offers ideas on how enterprises can address them:

As more employees are given mobile devices, it’s been easy to say, “We need a phone for this person,” without giving a lot of thought to the costs, security, and support. A process for giving employees phones must be implemented. For example, when someone requests a mobile device, the request should be approved by a supervisor and the CIO to provide two layers of authorization. There needs to be a clear...

Melody Sutton | 04 May 2011 | 0 comments

Photo of Julius Caesar from the fabulous Caeasar's Palace in Las Vegas

Here is a fabulous link to the podcast on a feature for mobile security.

 Enlightened Mobile Security 

What organization can do better for mobile devices

As mobile devices become more common in the workplace; organization can do better in the creation of their mobile device policies by working on the following items. First, ensure users are trained in security, cost effectiveness, policies, and require passwords for all devices. Encourage a strict policy for your company to limit the types of devices so they are managable, cost effective and detailed training can be provided on the devices. Most importantly ensure your IT department is knowledgeable and trained on mobile devices,...

dfrancis | 03 May 2011 | 0 comments
Ah, the clouds at Caesar's -- the best part of the outdoors, indoors.  Only in Las Vegas.  Little fluffy clouds.  Almost like the ones in Arizona in The Orb's song, appropriately called Little Fluffy Clouds.
Alas, the clouds at Caesar's are far from the "cloud" that we think of when we hear the term in an IT context, though whether you're throwing your data up into the cloud or painting them on the ceiling, you need to follow best practices or else you're setting yourself up for failure.  You'd probably need to consult with Daren Lewis' post, "Six Tips for Moving to the Cloud," or find the ghost of Bob Ross, depending on your cloud needs.
The cloud, or...
JasonTunis | 03 May 2011 | 0 comments

This wonderful program manager for connect told me tonight that I needed to post to this forum.

My thoughts around the challenges of cloud computing is control and compliance reporting. Having control over the policies and how they are applied will definitely lessen the challenges that Symantec will face when it comes to selling cloud solutions to corporations. With the end user company having this control, they will know that they have endpoints that are protected, and can report on the compliance of this as well. I definitely think this will provide a mutually benefitial relationship between customers and Symantec.

Joe Satriani - Clouds Race Accross the Sky


ThePuya | 03 May 2011 | 0 comments

Cloud computing is picking up traction with businesses, but before you jump into the cloud, you should know the unique security risks it entails.

One song that reminds me of cloud computing is Cloud Nine by the Temptations. A lot of people may think that they are on cloud nine because of the apparent ease of cloud computing and thus there is a lot of temptation to jump into clound computing without knowing the risks.

Clound is fraught with security risks. Smart customers will ask tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor.

Here are some best practices when implementing cloud computing: