Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all 5094 articles
Browse latest View live

Enterprise Vault Search (EVS) - Search across Archives

$
0
0

In EV11.0, Enterprise Vault Search (EVS) allows end users to perform search across multiple archives from same or different content source. This feature helps user to find items which may exists in multiple archives. There are two ways to perform a search on multiple archives.

1) Through Simple Search Pane: Click on the down arrow available in the simple search text box and then click on Choose Folder.

SearchAcrossArchives1.jpg

2) Through Advance Search Pane: From the search property drop down select Folder option.

SearchAcrossArchives2.jpg

A new window will be launched with a list of archives. Place a check mark against the archives or folders on which you want to perform a search. In the breadcrumb you will see "Multiple archives or folders are selected".

SearchAcrossArchives3.jpg

When you perform a search across multiple archives from the same content source (For eg: search on multiple Exchange archives) then the columns and actions on items (Export & Restore) do not change. 

SearchAcrossArchives4.jpg

However generic columns and limited actions on items will be available if you perform a search on multiple archives belonging to different content source. (For eg: Search on Exchange and FSA archives)

SearchAcrossArchives5.jpg

 

その他の投稿者: 

Go Boldly...Not Blindly

$
0
0

Symantec is known for protecting some of things we care most about. The lifeblood of countless businesses is dependent upon a reliable Symantec software package that is both cost-effective and safe. So it is no surprise that Symantec has stood up for the protection of life as we know it through the appropriate regulation of carbon. As an energy purchaser and forward thinking business, Symantec boldly joined the leadership class of companies in BICEP (Business for Innovative Climate & Energy Policy) back in 2009 and has stayed the course ever since. Most recently the company joined over 100 others in prudently supporting the Administration's Clean Power Plan to regulate carbon. The letter to the Obama Administration last June highlighted the economic case behind the new standard:  

It reads in part:

Our support is firmly grounded in economic reality. We know that tackling climate change is one of America's great economic opportunities of the 21st century and we applaud the EPA for taking steps to help the country seize that opportunity. 

Investing in antivirus software allows us to feel confident about the future security of our most vital and sensitive materials. Investing in an energy future that is free of carbon emissions gives us the confidence that those who matter most to us...our children and grandchildren...can live in a cleaner, safer, more sustainable world. A critical part of that investment is the commitment to regulate CO2 from power plants. Not making that investment would be like going into the future blindly hoping that all will be well instead of bolding demanding that it be so.  

Transitions are hard. But the necessary transition from a fossil fuel economy to one largely based on a diverse portfolio of energy sources is one that will make us all more secure. Companies like Symantec who purchase and use energy provide critical voices in this debate. We need others.  

Fortunately, Climate Summit 2014 has already proven to be an inspiring platform for bold statements. From Secretary John Kerry to Ikea CEO Peter Agnefjall to Apple CEO Tim Cook - we have heard unprecedented commitments for immediate action on climate change. Collectively, along with the 400,000+ who marched in the streets, they are encouraging us to boldly go, eyes open, into a clean energy economy that offers the economic return and the energy security we need for an equitable, prosperous future. More companies need to take their blinders off and stand shoulder to shoulder with Symantec in support of controlling carbon once and for all.

 

Anne Kelly is BICEP's Director, Business for Innovative Climate & Energy Policy

Evolving Telco Technologies Pose New Security Challenges

$
0
0

The telco industry is adapting to meet the needs of customers with more flexible technologies, such as Software-Defined Networking (SDN), and Network Functions Virtualization (NFV). However, these technologies are bringing new security considerations to light. Doward Wilkinson, Symantec Distinguished Engineer, discusses the need for adaptable security in this space.

Symantec Recognized as Leader for Climate Change Transparency

$
0
0

Today, Symantec was recognized by the Carbon Disclosure Project (CDP) as a leader among S&P 500 companies for the depth and quality of the climate change data we disclosed through our 2014 CDP submission. This is the second year that Symantec has achieved CDP leadership status.

The CDP facilitates corporate management and reporting of greenhouse gas emissions and climate-related risks and opportunities at the request of 767 investors, representing more than $92 trillion in assets. The leadership index includes 63 S&P 500 companies – the top 10 percent for disclosure scores. We’re honored to be a part of this group.

Since the very beginning of our corporate responsibility journey, we have recognized that climate change is an important issue for Symantec, our stakeholders and our world.  Over the last several years, we have reduced our energy footprint, systematically improved our data collection processes and formalized our environmental management system, and feel that we have made significant progress.  However, while we are celebrating our inclusion on the CDP Disclosure Leadership Index we know we have more work to do.  Looking forward, we intend to set a new goal to reduce emissions associated with our energy use, to create appropriate internal incentives to promote emission reduction activity across our business, and to better understand the emissions arising across our value chain in order that we can appropriately target our efforts. Recognition from organizations like the CDP – the world’s foremost climate change disclosure program  – provides us with validation that we are on the right track, and we’ll continue to work with our internal and external stakeholders to set goals, communicate with stakeholders, and reduce our impact.

Partnering with nonprofit organizations is a big part of our strategy to amplify our voice on these topics. Today – the day of the United Nations Climate Change Summit – we’re pleased to be featuring Anne Kelly of Business for Innovative Climate and Energy Policy (BICEP). Ann is blogging about the EPA’s new carbon emissions standards and the role of business in driving towards a clean energy future. Read her thoughts here.

 

Cecily Joseph is Symantec’s Vice President, Corporate Responsibility

Protecting Corporate Data in a Franchise Model

$
0
0

In order to optimise the success and operation of a franchising model, which could be an organization with affiliate or agent offices, we recommend there should be IT security standards set that the franchisee adheres to. Whilst generic standards and criteria are usually set out as contractual obligations, for example, livery and uniforms, operating hours, employee’s terms and conditions, codes of conduct and business interaction between franchise and the parent organisation, some standards are not so apparent or perhaps never even specified.

Take, for example, the computer infrastructure used to operate a franchise’s Point of Sale (POS) systems. It is often the case that we see a franchise model that is succeeding in profits but putting the parent company at risk due to a shortfall in the management and security of the franchise’s IT infrastructure. Sometimes systems are not standardised, centrally managed, kept up to date with end-point protection, or even utilising security software. 

In order for a franchise model to be protected and secured from security breaches, the franchise outlet ought to be thought of and treated as part of the organisation itself, even if it is not connected to, or using resources from the franchising company infrastructure. We suggest the franchise be operated as though it were part of the regular enterprise, aligned with the parent infrastructure to include the following:

Monitoring - The franchise outlets should be continually monitored for security events (Twenty-Four by Seven) by a competent Managed Security Service or Security Operations Centre, requiring the same attention as entities within the enterprise system. An agreement for Incident Response Services would undoubtedly help support the growth and security of the franchise system.

Operating Systems (OSs) - In our experience we have noticed that there are still many POS systems that are not using supported OSs. Organisations that use outdated and unsupported OSs, such as Windows XP, are at an increased risk of attack and exploitation. Migrating to a modern operating system helps in reducing the likelihood of an attack. 

Patch Management – Security patches for POS systems are critical, the subject of patch management has been visited many times before, but cannot be over emphasised. Enabling the centralised management of POS systems or any system that conducts payment processing by the franchiser, we suggest is a key strategy to help franchise stores in reducing the attack surface area and therefore overall risk to data security and the brand.

Principle of Least Privilege (POLP) - POS systems should have layers of security, which include accessing the system as restricted privilege users to enable general functions. In addition to customised local and global security policies, configured to protect what actions can be undertaken on the system itself only by authorised personnel.

Application Whitelisting – If available, application whitelisting for the POS system will only allow those programs essential to operation of the processing system to be installed and run and in order to minimise the attack surface of the POS system. Only PCI PA-DSS compliant (Payment Card Industry Payment Application Data Security Standard) applications should be installed on the POS system. Full compliance and security assessments must also be strictly adhered to.

Network Segregation – We suggest it is preferable to locate the POS system behind a separate Next-Generation Firewall (NGFW), which has strict access control lists (ACLs). Segmenting the system from other (non-payment) processing devices and / or databases is especially important when configuring and controlling remote network access.

Remote Access Controls - Controlling remote access to the POS system is one of the quick IT security wins that many franchises fail to implement in order to afford a higher degree of protection. These include configuring account lockout settings, limiting the number of users who can remotely authenticate to the system and enabling two-factor authentication (2FA). These controls would all assist in preventing security breaches.

User Behaviour – Like any other enterprise, the franchise system has an unintended human weakness in that users may not always regard their job from an IT security perspective. POS systems should be only used for their intended purpose and not for other uses, such as surfing the Internet, accessing email and social networking sites. End-user education and awareness about the importance and sensitivity of the POS system is vital and should be integrated in employee induction and subsequent training programmes.

In general, we propose it is important to view the franchise outlet, from an IT security standpoint, as though it were part of the enterprise, an extension of the parent company network. The same security policies, architecture and user protocols should be applied across the infrastructure. These factors all play a vital role to ensure that systems are properly protected and the likelihood of data breaches minimised, protecting not only data assets but also the brand itself and consumer trust.

Office of Public Sector Compliance - OPSC

VPAT™ Voluntary Product Accessibility Templates

$
0
0

VPAT™ Voluntary Product Accessibility Templates

The purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial “Electronic and Information Technology” products and services with features that support accessibility.

Symantec supports the U.S. Government's efforts to increase access to electronic and information technology (E&IT) for the disabled.  Symantec does not certify that its software products, services or appliance solutions are compliant with 508 requirements.

For additional questions regarding these VPAT forms, please contact xyz@symantec.com.

Security Solutions

Improving Efficiency and Reducing Risks with Storage Foundation ASLs

$
0
0

There are several aspects that prove that Storage Foundation is an enterprise storage management tool that has been used for years on the most critical environments. Recently I had the opportunity to use the NetApp EF550 all flash array with Storage Foundation Cluster File System (CFS). Both products are a perfect fit, as the design of CFS can maximize the all flash array performance.

The topic I want to cover here is the usual gap between storage and server admins, and how Storage Foundation can help fill that gap. Storage admins always do their best to provide the appropriate storage to meet the SLA required by applications. The server admins have to consume that storage. I have found many cases in the field where LUNs are not correctly mapped, which may result in risking data protection and/or performance issues resulting when storage with incorrect characteristics (such as RAID levels) has been provisioned.

The NetApp EF550 array offers a nice tool to create the LUNs. Each LUN is defined by one UDID and a name assigned to the LUN as we can see here.

netapp1.png

When using native tools, the mapping between the LUNs and how they are consumed on the server side can be a tough task not devoid of risks. Let’s examine several ways to accomplish this.

The semi-native way

In this example, I was adding 4 additional LUNs to my servers. Each new LUN has 8 paths, which means suddenly 32 new devices appear at the OS level. To add more complexity, there is another spare LUN already mapped to the server, so I have to also discover which are the four new LUNs added.

First, I have to find out which are the new devices added to the system. Going through fdisk output I can see some of the new devices. It is a little messy as I have 8 paths per device and to be honest, I have used Symantec Volume Manager to identify which are the new devices. By comparison, running the ‘vxdisk list’ command is easy to see what devices are new:

netapp2.png

So my trick here has been to use Symantec Volume Manager to identify the paths for the new devices. For example I can interrogate one specific disk using ‘vxdisk list <devicename>’

So just with ‘vxdisk list’ I can, in fact, get the UDID number, as well as identify which OS devices correspond to the LUN:

netapp3.png

Without Volume Manager, first I should have been able to identify which are the new paths for one specific LUN and probably use some scsi_id commands to find out that information. Clearly, it can be very tricky.

netapp4.png

So with that information now I can call my storage admin fellows and ask them about what LUN is …CB3A1, and they may come back with this information:

netapp5.png

Now, I finally know that /dev/sdcp is the 500GB LUN named ora_data_7. With Volume Manager, that will be my disk netapp-e0_99

Filling the GAP between storage and server admins

Why don’t we talk all the same language? The advantages of using an enterprise solution like Storage Foundation is that it really simplifies storage management. A component of Storage Foundation, called the Array Support Library (ASL) can discover the extended attributes for those disks and I just need to use ‘vxdisk –e list’ to get those. Instead of doing all the previous work trying to find out the LUNs and map them correctly, I am able to get this information in a single command:

netapp6.png

Now I can quickly identify the LUNs I am looking for. Not having this visibility is not only time consuming but also prone to errors. As I stated before, I have seen and heard many times about LUNs not properly mapped, putting business at risk because critical data was placed on storage that could not provide the SLAs required.

Storage Foundation fills the gap, enhances productivity, provides greater visibility and reduces risks.  Symantec’s regularly updated ASL’s can provide similar data for most of the industry’s popular storage arrays, just in case you’re not using the NetApp EF550 today.  You can find more about this and other extended attributes in the ASL/APM Technotes, available at http://sort.symantec.com

NOTE: This ASL version has not been published yet as it is in the certification process

Carlos.-

Thank you Chad and Dammi for your work to get this done!


新しい iPhone を保護するための 3 つの簡単な手順

$
0
0

Apple ID のアカウントや iPhone を安全に保つために基本的なセキュリティ対策(ベストプラクティス)を実施することをお勧めします。

Shellshock: All you need to know about the Bash Bug vulnerability

$
0
0

Web servers at risk as new vulnerability potentially affects most versions of Linux and Unix, as well as Mac OS X.

Shellshock: All you need to know about the Bash Bug vulnerability

$
0
0

Originally posted in Security Response

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X (which is based around Unix). Known as the “Bash Bug” or “Shellshock,” the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.

The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and Unix. Bash acts as a command language interpreter. In other words, it allows the user to type commands into a simple text-based window, which the operating system will then run.

Bash can also be used to run commands passed to it by applications and it is this feature that the vulnerability affects. One type of command that can be sent to Bash allows environment variables to be set. Environment variables are dynamic, named values that affect the way processes are run on a computer. The vulnerability lies in the fact that an attacker can tack-on malicious code to the environment variable, which will run once the variable is received.

Symantec regards this vulnerability as critical, since Bash is widely used in Linux and Unix operating systems running on Internet-connected computers, such as Web servers. Although specific conditions need to be in place for the bug to be exploited, successful exploitation could enable remote code execution. This could not only allow an attacker to steal data from a compromised computer, but enable the attacker to gain control over the computer and potentially provide them with access to other computers on the affected network.

Has it been exploited yet?
There are limited reports of the vulnerability being used by attackers in the wild. Proof-of-concept scripts have already been developed by security researchers. In addition to this, a module has been created for the Metasploit Framework, which is used for penetration testing.

Once the vulnerability has been made public, it was only a matter of time before attackers attempted to find and exploit unpatched computers.

How can it be exploited?
While the vulnerability potentially affects any computer running Bash, it can only be exploited by a remote attacker in certain circumstances. For a successful attack to occur, an attacker needs to force an application to send a malicious environment variable to Bash.

The most likely route of attack is through Web servers utilizing CGI (Common Gateway Interface), the widely-used system for generating dynamic Web content. An attacker can potentially use CGI to send a malformed environment variable to a vulnerable Web server. Because the server uses Bash to interpret the variable, it will also run any malicious command tacked-on to it.

Shellschock.png
Figure 1. How a malicious command can be tacked-on to the end of a legitimate environment variable. Bash will run the malicious command first.

The consequences of an attacker successfully exploiting this vulnerability on a Web server are serious in nature. For example attackers may have the ability to dump password files or download malware on to infected computers. Once inside the victim’s firewall, the attackers could then compromise and infect other computers on the network.

Aside from Web servers, other vulnerable devices include Linux-based routers that have a Web interface that uses CGI. In the same manner as an attack against a Web server, it may be possible to use CGI to exploit the vulnerability and send a malicious command to the router.

Computers running Mac OS X are also potentially vulnerable until Apple releases a patch for the vulnerability. Again, attackers would need to find a way to pass malformed commands to Bash on the targeted Mac. The most likely avenue of attack against OS X would probably be through Secure Shell (SSH), a secure communications protocol. However, it appears that the attacker would need to have valid SSH credentials to perform the attack. In other words, they would already have to be logged in to an SSH session.

For website owners and businesses
Businesses, in particular website owners, are most at risk from this bug and should be aware that its exploitation may allow access to their data and provide attackers with a foothold on their network. Accordingly, it is of critical importance to apply any available patches immediately.

Linux vendors have issued security advisories for the newly discovered vulnerability including patching information.

*Red Hat has updated its advisory for this vulnerability, noting that its initial patch is incomplete.

If a patch is unavailable for a specific distribution of Linux or Unix, it is recommended that users switch to an alternative shell until one becomes available.

For consumers
Consumers are advised to apply patches to routers and any other web-enabled devices as and when they become available from vendors. Users of Apple’s Mac OS X should be aware that the operating system currently ships with a vulnerable version of Bash. Mac users should apply any patches for OS X when they become available.

Symantec Protection
Symantec has created an Intrusion Prevention signature for protection against this vulnerability:

Symantec will continue to investigate this vulnerability and provide more details as they become available.

Symantec Appoints Michael A. Brown CEO

$
0
0

MichaelBrown.jpegMOUNTAIN VIEW, Calif. – PRESS RELEASE September 25, 2014– The Board of Directors of Symantec Corp. (NASDAQ: SYMC) today announced the appointment of Michael A. Brown as the company’s CEO, effective immediately.  Mr. Brown has been serving as interim president and CEO since March 2014.

On behalf of Symantec’s Board, Chairman Dan Schulman said, “I am thrilled that after conducting a broad and thorough search, the Board has unanimously chosen Mike to lead Symantec into the future.  As interim CEO, Mike brought energy and intensity to the organization that created momentum in the business, made significant improvements to Symantec’s operating and financial performance and brought additional talent to our industry-leading team.  Most importantly, he demonstrated vision and creativity as he has worked with the Board and the management team to develop a strategic plan based on focused investment and innovation in key areas of high customer need.  With this appointment, the Board looks forward to working with Mike to bring this vision to reality and to continue Symantec’s momentum.”  

Mr. Brown will share the company's strategic plan with shareholders, customers and employees within the next 30 days.  The plan will build upon the company’s stated priorities, increase focus on the customer and build shareholder value.

David Mahoney, head of the Board’s CEO search committee, said, “The Board ran a robust and diligent global CEO search over the last six months, during which we received interest from world-class candidates, including current and former CEOs and technology leaders from successful public companies.  Mike went through this same rigorous process and distinguished himself among the candidates.”

Mr. Brown’s appointment follows a multistep search process conducted by a special committee of the Board of Directors in conjunction with leading executive search firm Russell Reynolds over the last six months.  The search included reviewing over 100 qualified candidates, more than 30 of whom were actively vetted.

Michael Brown said, “The demand for security and information management solutions has never been greater, and I am honored to be named Symantec’s Chief Executive Officer as we work to deliver innovation and value for our customers.  Symantec is the global leader in security, and the threats facing our customers are becoming increasingly sophisticated and complex.  In my time as interim CEO, Symantec has made significant progress to strengthen our business and accelerate our innovation, and I am proud of the individual and collective efforts of Symantec’s team.  Specifically, we are focusing our investments in businesses where demand is greatest and improving operational efficiencies to grow revenue and operating margin.  I look forward to continuing to focus the company’s strategy to deliver for our customers and our shareholders.”

Since Mr. Brown was appointed interim president and CEO in March 2014, Symantec has returned to year-over-year revenue growth and has consistently exceeded its revenue and operating margin guidance. Mr. Brown has introduced new revenue and efficiency initiatives, which contributed to increased revenue in the first quarter of fiscal 2015 and have put Symantec in position to further enhance revenue growth in the second half of fiscal 2015.  He also made key executive hires as he worked to further develop Symantec’s industry-leading executive management team.

Michael A. Brown joined Symantec's Board of Directors following the company's merger with VERITAS Software in July 2005, and previously served as chairman and chief executive officer of Quantum Corporation.  Under his leadership, Quantum grew from $3 billion to $6 billion in revenues and held market leadership positions in primary storage, secondary storage as well as back-up and archiving solutions.  More recently, Mr. Brown has been a board chairman and chief executive officer coach for several successful technology companies prior to their acquisitions, including EqualLogic, Line 6 and The Echo Nest.  In addition to his deep expertise in growing businesses, Mr. Brown has extensive experience in leading and developing executive management teams. 

About Symantec

At Symantec Corporation (NASDAQ: SYMC), we protect your information wherever it’s stored, accessed or shared. Founded in April 1982, Symantec operates the largest civilian cyberintelligence threat network in the world. The company's more than 20,000 employees reside in more than 50 countries and are pioneering new solutions in growing markets like backup appliances, mobile, cloud, advanced threat protection, data loss prevention, and managed security services. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: www.symantec.com/social/

 

Screen Shot 2014-09-22 at 1.20.01 PM.png

 

Twitter Chat: Protected Clouds are Better Clouds: Do people trust clouds or do they trust brands?

$
0
0
#DirtyTopics Twitter Chat – October 9, 2014

Topic: Do people trust clouds or do they trust brands?
Date: Thursday, October 9, 2014
Time: Starts at 11:00 a.m. PT / 2:00 p.m. ET
Length: One hour
Where:  Virtual event on Twitter.com – Follow hashtag #DirtyTopics
Expert: Alex Sakaguchi, Senior Product Marketing Manager, Symantec - @ASakaguchi

Alex_intro_meme.jpg.jpeg

            CIOs are becoming increasingly invested in the cloud, with 92 percent saying they believe it provides business benefits, according to a survey conducted by Dimensional Research. From cost savings, efficiency, rapid deployment, scalability, and ubiquitous accessibility, cloud computing brings with it several benefits. As shown by its 33 percent quarter-to-quarter growth this year, many organizations are leveraging the cloud to host business data in both IaaS and SaaS incarnations.

            As individuals and organizations realize the potential agility and business benefits of cloud computing, concerns about security of clouds continues to grow. With a plethora of cloud providers, it can be a sensitive subject when it comes to selecting a vendor based on qualifications versus trusting a brand name. Cloud giants like Google, AWS, Microsoft and IBM have been announcing price drops to lure more users to their cloud services, but with vulnerabilities and security exploitations, selecting the right vendor can make a critical difference between a breach and a secured cloud environment.
 
            The Dimensional Research study also found that 33 percent of cloud services in use were vulnerable to the Heartbleed Bug, which has since decreased to 1 percent thanks to the steps taken by cloud service providers. However, given this ecosystem of rapid growth, potential business benefits, and risks, how does a CIO decide which cloud service provider will work best for their business?
 

            Gain confidence in the protected cloud and learn the different features IT decision makers should take into account when choosing a cloud service provider with security expert Alex Sakaguchi. Explore how to mitigate the risk of migrating the SDDC and Agile Data Center to the cloud, and discuss ongoing cloud computing needs, scalability, and security policies for cloud vendors in more detail in a #DirtyTopics chat on Twitter, “Do people trust clouds or do they trust brands?” on Thursday, October 9 at 11 a.m. PT / 2 p.m. ET. If you have questions about what are the biggest factors for your decision on which cloud service provider to use for your data center, Alex can help.

For more information, read Delivering Agile Security For Enterprise Clouds with SDDC and Micro-Segmentation. #GoTransform

National Hispanic Heritage Month - Say Hi to HOLA Symantec’s Latino Employee Resource Group

$
0
0

September happens to be a unique month for Latinos. The 15th marks the anniversary of independence of five Latin American countries: Costa Rica, El Salvador, Guatemala, Honduras, and Nicaragua. Mexico and Chile also celebrate their independence in September, the 16th and the 18th respectively. It’s of no surprise why September 15th kicks off National Hispanic Heritage Month.

Here at Symantec, where diversity is embraced and networks encouraged, the Hispanic Outreach and Leadership Affinity group (HOLA) represents our Employee Resource Group (ERG) for Latinos.

Hola1.jpg

HOLA ERG group Heathrow Champion Katherine Sabatino (right) & Co-Champions: Marisol Starr (left) Rodrigo Nunez (center).

In 2009, a few of us noticed that there were a diversity of ERG groups within Symantec, but we were missing a network dedicated to Latinos. HOLA grew out of this seeking to cultivate a community that supports Hispanic employees in professional development as well as expose other employees to the diverse Hispanic culture. Our goal is to reach out to our community – both within the company and the community at large – with a cultural aspect. We started to spread our mission by hosting annual events around Hispanic Heritage Month, which have since become a central component to HOLA. The event historically includes speakers and dancers to educate others on Hispanic culture, bringing in students from the local area to tour the Symantec campus, and setting up mentor lunches between students and employees.

What started with events around Hispanic Heritage Month has expanded to much more. Past events include a Professional Networking event, internet safety program at local schools, and a holiday fiesta – to name a few.  Some chapters arrange a company-wide food truck event about once a quarter and tie it to a charity, where 10% of sales get donated to that charity. At the Heathrow campus, their signature event is the soccer tournament, a big event with organized teams and brackets.

We also interact with schools and universities to show students the value of science and math and the opportunities before them. Students from underserved areas come to Symantec to get a glimpse of what it's like to work in a tech or computer science career. For many of them, this exposure is the first of its kind. We want to show our coworkers and the outside world what a great place Symantec is to work for Hispanic employees!

The ultimate goal for all ERGs is that they are an asset to our employees and the company. For example, we aim for HOLA to serve as a place for the company to locate a pool of talented candidates to improve diversity at Symantec. Additionally, our goal is to make sure that HOLA’s goals are aligned with the company’s business goals, for example around diversity. There is a real purpose both for the reasons noted above (culture, education, networking, etc.) as well as to support Symantec’s corporate responsibility and business goals. 

We are very happy to celebrate National Hispanic Heritage Month with all of our colleagues at Symantec and look forward to expanding HOLA’s activities and reach in the years to come.

For questions regarding HOLA please HOLA-MVT@symantec.com or Katherine_Sabatino@symantec.com.

 

And for a bit of fun in honor of National Hispanic Heritage Month, take a stab at our fun quiz below to test your Hispanic Heritage IQ!

 

Test your Hispanic Heritage Knowledge:

When did the observance of Hispanic Heritage in the U.S. begin?

It began in 1968, when Congress authorized President Lyndon B. Johnson to proclaim the week that included September 15 and 16 as National Hispanic Heritage Week.

How many Latinos live in the U.S.?

There are 53 million Latinos living in the United States, as of July 1, 2012, the date of the most recent data available from the U.S. Census Bureau. Latinos constitute 17 percent of the country's population and are the country's largest ethnic or racial minority.

When did the observance of Hispanic Heritage expand to a month?

The observance was expanded to a month in 1989 and celebrates the culture and traditions of those with roots in Spain, Mexico, and the Spanish-speaking countries of Central and South America and the Caribbean.

 

By Michelle Losenicky; Eric Domagalski; Katherine Sabatino

Protected Clouds are Better Clouds: Do people trust clouds or do they trust brands?

$
0
0
#DirtyTopics Twitter Chat – October 9, 2014

#DirtyTopics Twitter Chat – October 9, 2014
Topic: Do people trust clouds or do they trust brands?
Time: Starts at 11:00 a.m. PT / 2:00 p.m. ET
Where: Virtual event on Twitter.com – Follow hashtag #DirtyTopics
Expert: Alex Sakaguchi, Senior Product Marketing Manager, Symantec - @ASakaguchi


NVIDIA models Lunar Landing pictures

Next Generation Security Operations Center in Sydney, Australia Positions Symantec Closer to Global Cyber Center Vision

$
0
0

Symantec has recently opened a new Security Operations Center (SOC). What does this move mean for global cyber security, and Symantec's growth in leadership in the field?

Backup Exec 2014 Icon Glosasary

$
0
0

Have you ever wondered why your storage/media has a pencil with a red slash through it?  logo 2_0.PNG

    icon 1_0.PNG     Or what the yellow warning triangle is on a remote server?

 

Try refering the the Backup Exec 2014 Icon Glossary to help you identify the icons used within the Backup Exec 2014 Console.

Backup Exec 2014 Icon Glossary: http://www.symantec.com/docs/TECH216802

Symantec/Light Reading Webcast: When MDM is not enough: Service Provider Key Considerations for Monetizing Mobility

$
0
0

Please join Light Reading and Symantec for a webcast titled When MDM is not enought: Service Provider Key Considerations for Monetizing Mobility on October 15, 2014 at 11:00 am ET/8:00 am PT.  The webcastwill be hosted by Ari Banerjee, Principal Analyst, Service Provider IT for Heavy Reading and Ellen Linardi, Director  of Product Management, Enterprise Mobilty for Symantec.

All attendees to the webcast will also receive a copy of the Heavy Reading whitepaper, The Pillars of a Next-Generation Enterprise Mobility Solution.

CLICK HERE TO REGISTER.

Australians increasingly hit by global tide of cryptomalware

Viewing all 5094 articles
Browse latest View live




Latest Images