Welcome to
the Cloud Generation

The Cloud Generation is everyone who lives and works in this unique era, as computing breaks the boundaries of desktops and data centers to embrace the mobile, social, global, crowd-sourced, always-on realities of modern life.

It's a time when critical data, applications and infrastructure are shifting from behind the firewall to running on the cloud. Some of us are all in. Some are only 20% there.

Yes, it's liberating. Yes, it's chaotic.

Symantec is here to help.

Voices of the Cloud Generation

What does complete, effective cyber security entail when your data and users live everywhere? Hear different perspectives and challenges from security professionals tasked with protecting the Cloud Generation.

Rethinking Security
for the Cloud Generation

Cloud computing has rendered the traditional security stack irrelevant, as traffic patterns change, new devices are added, and cloud applications pop up virtually overnight.

It's time for the Cloud Generation to rethink requirements for enterprise security. Here are some important questions to consider:

  • Is there a way to protect critical enterprise assets from all attacks, at every control point, on-premises and in the cloud?
  • How do you validate employee identities and track their moves across every system to gain compliance while also maintaining privacy?
  • Is it possible to have "the same" security across on-premises and in the cloud?
The Essential Eight: Understanding Key Requirements for Securing the Cloud Generation

Download this new eBook to learn more.

Incredible Promise. Great Risks.

The cloud holds incredible promise to make businesses more competitive, connected and productive.


The average reduction of total cost of ownership (TCO) among cloud adopters across financial services, technology, manufacturing, and communications industries.1


Growth rate for hybrid cloud adoption in the past year, increasing from 19% - 57%, while the number of cloud services being used dropped from 43 to 29 over the same period.2

The cloud also poses great risk, as people, data, and infrastructure are ever more vulnerable to cyber attack.


The average number of mobile devices used in a typical Global 2000 enterprise, 1700 of which are likely to be infected with malware at any given time.3


Number of cloud apps the average enterprise organization was using; most CIOs think their organizations only use around 30 or 40 cloud apps.4

Integrated Cyber Defense

Symantec’s powerful platform unifies cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.


Internet Security Threat Report (ISTR) 2019

Our 123 million sensors record thousands of threat events per second from 157 countries and block 142 million threats daily. Use intel from the world’s largest civilian threat network to your advantage—download ISTR 24 now.

Security Innovation for the Cloud Generation

Securely connecting your people to their information in the cloud means integrating all your security technologies. Learn how Symantec secures the Cloud Generation.

Symantec 2018 Shadow Data Report

The Symantec Shadow Data Report covers key trends and challenges organizations face when trying to ensure their sensitive data in cloud apps and services remains secure and compliant.