Andrew Jaquith
Andrew Jaquith
available business companies compliance continuity costs current deployed email enterprise increased instant management mandates meet nearly needs percent products separate support systems
Enterprises have increased needs to keep their enterprise messaging systems continuously available -- for business continuity purposes, to meet compliance mandates and to support investigations. But companies don't want separate products for email, instant messaging and other protocols -- these just increase costs and make management more complicated. Of the nearly 60 percent of enterprises that have already deployed an instant messaging or email archiving product, one-third are re-evaluating their current solution.
brings code hard number personal product together
They have a number of different code bases, which can be hard to manage. They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.
brings code hard number personal product together
They have a number of different code bases, which can be hard to manage, ... They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.
among businesses following good norton product refresh strong
It's a good idea for Symantec to refresh the Norton product line, which has a strong following among businesses and consumers,
balanced behavioral business deployed disrupted nearly products research security shows solutions stop suffered virus worm
Traditional signature-based security products can't stop zero-day attacks. Our research shows that while 99% of corporations have deployed anti-virus software, nearly two-thirds (64%) nonetheless suffered virus or worm outbreaks that disrupted at least one business unit. Behavioral security solutions are an increasingly important part of a balanced security program.
behavior change necessary people possible problem products protect require security simple steps users
The problem with most security products is that they require people to change their behavior, so vendors need to make it as simple as possible for all users to take the necessary steps to protect themselves.
crying problems question security stream
It's not a question of someone crying wolf. It's just that there are so many wolves, there is a lot of crying going on. It's just one more thing in a never-ending stream of security problems for Windows.
combined mainstream microsoft trying
If Microsoft had not combined the two, you would still see the mainstream antivirus vendors all trying to premium-price all these things separately.
computers looked workers
They looked at everything workers did on the computers.
deal families good home licenses three type
Up to three licenses is a real good deal. I think it is very consumer-friendly and a good deal for families and SOHO (small office, home office) type businesses.
adopting demand developed interest microsoft solution technology viable
There could be demand for the technology developed through Higgins, because there are those enterprises that have no interest in adopting a Microsoft solution and want a viable alternative.
automated create exploit hackers impact mistakes number problem seem type unique vast windows
This type of problem is not unique to Microsoft, but they seem to keep making the same mistakes. The vulnerability is noteworthy because hackers could create an automated exploit that would impact the vast number of Windows users.
attention meet military security systems work
And the military has farmed out a lot of work on their systems to third-party vendors who can meet the specifications but may not give security as much attention as it requires, ... Security for any public-facing applications is critical.
adequate data harness information protect software store
Protect the most important things. For instance, store customers' credit-card information on a transactional server, but harness software that can encrypt the data. It is important to keep data where adequate protections are available.