This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here). Architecture CTO Cyber Security DoD and IC Research antivirus Computer security Fixmo Hexis Information security invincea Symantec Triumfant Wall Street Journal' To read more please log in.
Enterprise IT and cyber security professionals should all track the recent news of Symantec splitting into two publicly traded firms. Before giving our cut, review the official press release here: Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies.
In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the furtherance of the art and science of cyber threat intelligence. McAfee and Symantec join Cyber Threat Alliance (net-security.org).
Aiming to boost its consumer security business, Symantec is acquiring LifeLock, a vendor of identity protection services, for US$2.3 billion in enterprise value. The deal will create what the two companies described as the world’s largest consumer security business with over $2.3 In the U.S.
So, what are its implications for the enterprise and cybersecurity? It is a scientific and engineering game-changer for the enterprise. But the shock of how fast Generative AI applications such as ChatGPT , Bard , and GitHub Pilot emerged seemingly overnight has understandably taken enterprise IT leaders by surprise.
A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers.
Looker Datafold Engine empowers analysts with more meaningful insights through its in-database architecture, Symantec uses Splunk software to boost its security intelligence operations, and CommVault''s Simpana 10 software has achieved certified integration with the SAP HANA platform. Big Data commvault looker sap splunk Symantec'
Oracle is not the first company that comes to mind when you think of enterprise security, but the company announced at its recent OpenWorld conference new products with artificial intelligence (AI) and machine learning capabilities to quickly identify security threats.
In just six months, we are already seeing it reach a technology inflection point as enterprises rush to implement widespread use of generative AI apps. The implications for enterprise security For most enterprises, the present moment is an educational process. Symantec and generative AI Symantec has a long history with AI.
Broadcom distrust drives sales for VMware competition August 14, 2024 : Concerns about the new direction VMware is taking are driving some enterprise customers to consider alternative platforms from vendors such as Scale Computing, Nutanix and Oxide Computer. Can Broadcom + VMware move enterprise networking forward?
Now, learn how to ensure fast failover and disaster recovery for enterprise applications. White Papers Symantec' Your applications are absolutely critical to you and your users.
At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity. Copyright Issues: Enterprise employees use Generative AI to create content such as source code, images, and documents.
Target customers are enterprises and telecom service providers looking to defend against malware and ransomware attacks, and to defend against nation-state actors. For example, attackers can exploit weaknesses in enterprise applications or infrastructure to infiltrate networks, then move laterally as they hunt for high-value assets.
Improved connectivity and traffic-management features are aimed at helping enterprises to deploy AI at the edge. In addition, Symantec points of presence will now be integrated with VMware VeloCloud SASE, while VMware Edge Compute Stack, a runtime and orchestration platform, is now optimized to support AI workloads and traffic patterns.
Conversely, cloud-native security solutions tend to force enterprises to route traffic through cloud data centers, which sacrifices network performance. dope.security intends to improve cloud security and performance by rethinking legacy secure web gateway (SWG) design, removing a stop between enterprise resources and end users.
OpenAI nearly imploded last fall when the company fired its CEO and most of its employees threatened to quit, reminding enterprise adopters about the risks of putting all their genAI eggs in one basket. It allows enterprises to make a curated selection of AI models available to their developers, along with access controls to those models.
By Rob Greer, Vice President and General Manager, SymantecEnterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. Enterprises still want to leverage multiple clouds, including their own.
Very simple: The future of the enterprise — your enterprise — is private. It’s another extra layer for you to manage. And in Compliance, if you have regulatory policy requirements.” “So, So, here’s my view,” Tan said. Private cloud, private AI, your own private data. It’s about staying on prem and in control.
Mobile apps are expected to drive more than $38 billion in revenue by 2015, and enterprises have joined the cause. BYOD , the app economy, and the overall consumerization of IT have contributed to a growing need for enterprises to build application development lifecycles specifically for mobile that can reap long-term benefits.
Enterprises currently using a smaller vendor for SSE might start thinking about switching, Holmes says, or might hang on for the short term. “In For example, several companies, including Google and Palo Alto, have recently rolled out enterprise browsers, which have all necessary security technologies built right in.
In fact, many large enterprises are not only embracing micro-segmentation to protect cloud, container and VM workloads, but they are also using it to replace, you guessed it, physical data center firewalls. ZScaler comes to mind, but so do Blue Coat (Symantec), Proofpoint and all the CASB service providers.
Just a few months ago, Symantec bought Blue Coat taking a private company public and forming a cybersecurity industry colossus in the process. There are some interesting industry dynamics going on in the cybersecurity market. Now two other historical cybersecurity powerhouses are heading in the other direction and going private.
Regin, new computer spyware, discovered by Symantec. Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range … Read more on BBC News. Top five enterprise technology trends for 2015.
In fact, 87% of enterprises across 11 countries have fallen victim to cyberattacks in the past three years. Prior to Anomali, Karen was CMO of Symantec, a role Broadcom appointed her to after its acquisition of the company. Before Symantec, Oracle selected her to oversee global communications for its executive office.
February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. ABOUT SYMANTEC. Ninety-nine percent of Fortune 500 companies are Symantec customers. Santa Clara, Calif.,
Thanks to the panel, the audience left the event smarter about how they can navigate the challenges of developing mobile apps for the enterprise. App development and distribution: Building apps for the enterprise is not easy, Verivo Software CEO Steve Levy said. They expect the same from enterprise apps.
I enjoyed talking with ZDNet’s Chris Preimesberger and Sahana Sarma, leader of Google Cloud’s transformation advisory, about the enterprise software landscape and how it is growing more complex and business-critical daily. To learn more about how Broadcom Software can help you modernize, optimize, and protect your enterprise, contact us here.
As we know at Broadcom Software , even as enterprises try to put a couple of abnormal years in their rear-view mirror, the rampage of ransomware continues to wreak havoc and requires continued focus and diligence. Meanwhile, attackers are using different techniques to penetrate enterprise networks. Symantec by Broadcom Software.
He also oversaw managed services as a vice president at VeriSign and Symantec, as a result of the company’s acquisition of Riptech. I could not be more excited to join the company as it enters its next stage of significant growth and continues to change the game in the security market.”.
QlikTech has over 22,000 in customers in over 110 countries, from middle market to large enterprises such as BP, Campbell Soup Company, Colonial Life, The Dannon Company, Inc., Heidelberger Druckmaschinen AG, ING, Kraft Foods, Lifetime Brands, National Health Service (NHS), Qualcomm, Symantec and Volvo Car UK Limited.
QlikTech has over 22,000 in customers in over 110 countries, from middle market to large enterprises such as BP, Campbell Soup Company, Colonial Life, The Dannon Company, Inc., Heidelberger Druckmaschinen AG, ING, Kraft Foods, Lifetime Brands, National Health Service (NHS), Qualcomm, Symantec and Volvo Car UK Limited.
Unstructured data Unstructured data tends to be the bulk of information available to enterprises. The ability to maintain and process graph data is particularly important to large enterprises with huge amounts of data that need to be used for AI. For example, a PDF might have an embedded URL to a related document.
Throughout his career, Mark has been on the front lines of innovation, leading product efforts in both start-up and large enterprise organizations including Check Point Technologies, Security Focus, Symantec and Hewlett Packard Enterprise.
Because of that success, we have decided to expand that program to include more of Broadcom’s software portfolio, specifically CA Technologies enterprise software, mainframe software, and cybersecurity solutions (including Symantec and Carbon Black). We call it the Accelerate Program.
Enterprises and operators of critical infrastructure have long been on the front lines of cybersecurity. Most recently, new threats have been identified through our Symantec Threat Hunter team, including Lazarus , Verblecon and Daxin. We will now explore each of these predictions in more depth with this blog series.
Like many enterprises, Cathay Pacific relied heavily on a lift-and-shift approach in its initial phase to benefit from the immediate efficiencies and scalability of the cloud. At the same time, enterprises are increasingly pursuing zero-trust strategies.
Talk about timing: just as we completed the acquisition of Symantec in November 2019, a global pandemic hit. To learn more about how Broadcom Software can help you modernize, optimize, and protect your enterprise, contact us here. Enterprise, IT Leadership About the Author: Broadcom Software.
He is widely known as a community-focused thought leader with special skills in enterprise technology and cyber security. as Director of Government Research at Symantec Research Labs, and was the first Director of Technology Assessment at In-Q-Tel. He has previously served as Chief Strategy and Security Officer at WiTopia, Inc.,
Throughout his career, Mark has been on the front lines of innovation, leading product efforts in both start-up and large enterprise organizations including Check Point Technologies, Security Focus, Symantec and Hewlett Packard Enterprise.
As recently as February this year, the Symantec Threat Hunter team saw ConnectWise used in both Noberus and Royal ransomware attacks. She works with other security experts within Symantec to investigate targeted attacks, ransomware and other cybercrime.
They are: Focus on building relationships across the enterprise. This post is brought to you by Symantec and The Transition To The Agile Data Center. There’s no reason for a CIO to remain sidelined. 2014 CIO State of the CIO Survey has a few suggestions for CIO’s who find themselves in this predicament. Leadership The New CIO CIO si'
By Arnaud Taddei, Security Transformation Architects Practice Leader – International, Symantec, a division of Broadcom Software. This work is directly relevant to enterprise CISOs. Arnaud Taddei held senior positions at CERN, Sun Microsystems and was Technical Director to Symantec CTOs. To learn more, contact Broadcom Software.
Customers can also operate with confidence as a result of our actions in software, such as our migration of Symantec Web Security Service and Cloud Access Security Broker onto Google Cloud.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content