{"id":24312,"date":"2012-09-18T12:33:03","date_gmt":"2012-09-18T02:33:03","guid":{"rendered":"http:\/\/power-up.space\/?p=24312"},"modified":"2012-09-18T12:33:03","modified_gmt":"2012-09-18T02:33:03","slug":"security-mobility-and-virtualisation-lead-the-symantec-symposiums-in-australia","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=24312","title":{"rendered":"Security, Mobility and Virtualisation Lead the Symantec Symposiums in Australia"},"content":{"rendered":"<p><strong>SYDNEY, Australia \u2013\u00a0 18 September, 2012 \u2013<\/strong> Today at the Symantec Symposium 2012 (NASDAQ:SYMC) in Sydney, Assistant Commissioner Neil Gaughan APM, National Manager High Tech Crime Operations, Australian Federal Police discussed how the biggest online security threats are impacting the way consumers, enterprises and governments protect their information and identities.<\/p>\n<p>Symantec executives Bernard Kwok, senior vice president, Asia Pacific and Japan, and Brenton Smith, vice president and managing director, Pacific region also shared the company\u2019s vision across today\u2019s biggest trends such as mobility, virtualisation, cloud, and big data.<\/p>\n<p>\u201cThe Internet is now an intrinsic component of our modern global society providing a platform for instant business and social communication,\u201d said Assistant Commissioner Neil Gaughan APM, National Manager, High Tech Crime Operations, Australian Federal Police. \u201cCountless activities aided by the Internet bring plenty of positive benefits to our lives, however its growth and global reach have also provided opportunities for criminals to conduct illicit activity more efficiently, economically, and to an extent anonymously. The ability to use technology to commit crime, attack critical infrastructures, and undermine national security is a very real threat that law enforcement is responding to and, every organisation, large or small, needs to ensure they have a defense-in-depth strategy for protecting the vital assets on which their business depends.\u201d<\/p>\n<p>With the proliferation of mobile devices across Australia, it\u2019s also expected that new threats on mobile devices will be introduced and exploited by cybercriminals, causing many consumers and enterprises to be cautious about placing personal or confidential information on their mobile devices. According to the Symantec Internet Security Threat Report, the number of mobile threats increased by 93 percent in 2011 and in the past year, Symantec blocked 5.5 billion attacks.<\/p>\n<p>\u201cWe live in an always on, connected world,\u201d said Bernard Kwok, senior vice president, Asia Pacific and Japan, Symantec. \u201cMobile devices are truly becoming first class citizens of corporate IT. They are being used for work more than ever before and corporate applications are not the only apps being accessed, as more and more employees use consumer mobile applications for business.\u201d<\/p>\n<p>Symantec\u2019s most recent State of Mobility survey found that 70 percent of businesses said data loss and malware infection were two of their top risks for mobile computing. In addition, Symantec estimates that 60 percent of companies are already making line-of-business applications accessible from mobile devices.<\/p>\n<p>\u201cWe believe you shouldn\u2019t have to sacrifice protection for productivity,\u201d Kwok continued. \u201cAllowing employees to bring their own devices into the workplace and use them to access corporate networks and information does not mean you have to compromise on protection. Symantec protects you and your business\u2019 information regardless of platform and we offer the best capabilities in mobile device and mobile application management to protect information on company and employee owned devices.\u201d<\/p>\n<p>As with mobile devices, companies want to be able to take advantage of the productivity that comes with the cloud but are concerned about protection. To take advantage of the opportunities, businesses must be able to protect information across corporate and employee-owned devices as well as public and private infrastructure that may be a physical or virtual environment.<\/p>\n<p>Today, most organisations have already virtualised some of their application workloads and plan to virtualise more. Virtualising business-critical applications delivers significant strategic benefits and is a key step toward a cloud model of IT service delivery.<\/p>\n<p>But these applications also require provably high levels of security, resiliency, performance, and operational efficiency. Symantec solutions for business-critical virtualisation are optimised for all leading virtualisation platforms, and provide the advanced security, availability, and storage management capabilities required to virtualise business-critical applications with confidence.<\/p>\n<p>\u201cYesterday\u2019s solutions won\u2019t completely protect your company today,\u201d said Brenton Smith, vice president and managing director, Pacific region, Symantec. \u201cConfidence ultimately means businesses having visibility and control of their information wherever it resides. At Symantec, we\u2019re focused on protecting people and information \u2013 whether it\u2019s in the data centre on physical or virtual servers, structured in databases or in archives for long term storage and retention.\u201d<\/p>\n<p>Taking place in across eight cities in Australia and New Zealand, the Symantec Symposium series is sponsored by Dell, Intel, Red Hat, VMware, Data#3 and Insight. More information about the 2012 Symantec Symposium can be found <a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221744,23197715,313020,1?erl=http%3A%2F%2Fwww.symantec-events.com.au%2F\" target=\"_blank\">here<\/a>.<\/p>\n<p><strong>About Symantec <\/strong><br \/>\nSymantec protects the world\u2019s information, and is the global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment \u2013 from the smallest mobile device, to the enterprise data centre, to cloud-based systems. Our industry-leading expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at <a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221744,23197715,298308,1?erl=http%3A%2F%2Fwww.symantec.com%2Fen%2Fau%2F\" target=\"_blank\">www.symantec.com<\/a> or by connecting with Symantec at: <a href=\"http:\/\/auc.tractionplatform.com\/id=4880,18221744,23197715,272444,1?erl=http%3A%2F%2Fwww.symantec.com%2Fsocial-media\" target=\"_blank\">go.symantec.com\/socialmedia<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SYDNEY, Australia \u2013\u00a0 18 September, 2012 \u2013 Today at the Symantec Symposium 2012 (NASDAQ:SYMC) in Sydney, Assistant Commissioner Neil Gaughan APM, National Manager High Tech Crime Operations, Australian Federal Police discussed how the biggest online security threats are impacting the way consumers, enterprises and governments protect their information and identities. Symantec executives Bernard Kwok, senior<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=24312\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28,25],"tags":[],"class_list":["post-24312","post","type-post","status-publish","format-standard","hentry","category-tech-news","category-software-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24312"}],"version-history":[{"count":2,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24312\/revisions"}],"predecessor-version":[{"id":24314,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24312\/revisions\/24314"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=24312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=24312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}