Senior managers are targeted most in targeted malware attacks

 Symantec.cloud recently identified who is most at risk for targeted malware attacks. Identifying recipients by their internet footprint, Symantec.cloud determined the following:

·         34%  of recipients are senior managers with titles such as ‘Vice President’ or ‘Director’

·         24% of recipients are individuals with managerial responsibilities

·         19% are general mailboxes such as ‘recruitment@’ or ‘enquiries@’

·         19% of recipients are not identifiable through public internet searches

·         4%  are employees of low seniority; many of these recipients are personal assistants to senior managers

 

Targeted malware is designed to attack the computers of specific individuals to either extract valuable info or to act as a launching pad for further attacks within an organization. It’s important to understand who is vulnerable within an organization so businesses can better protect themselves against such threats.

 

For more information about who is at risk from targeted attacks, please visit Symantec.cloud’s blog:

http://www.symantec.com/connect/blogs/are-you-risk-targeted-attacks-lifting-lid-who-was-being-targeted-2010

 

Please let me know if you’re interested in speaking with a Symantec.cloud expert about targeted attacks.

 

Thanks,

Natasha

http://www.symantec.com/connect/imagebrowser/view/image/1747571/_original

Recipients of targeted attacks grouped by seniority of recipients.

 

 


 

 

http://www.hillandknowlton.com/oldbinaries/hksig_logo.gif

 

Natasha Parnanzone

 

Consultant

 

Hill & Knowlton Canada

 

 

Direct Line: +1 416 413 4740

 

 

Fax: +1 416 413 1550

 

 

natasha.parnanzone@hillandknowlton.ca

 

 

 

 

 

160 Bloor Street East, Suite 700, Toronto, Ontario, M4W 3P7 Canada

 

http://www.hillandknowlton.com

 

 

 



Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may not copy or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you or your employer does not consent to email or messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of Hill & Knowlton Canada shall be understood as neither given nor endorsed by it.

(download)

: PRESS RELEASE: Symantec Reports Fourth Quarter Fiscal 2011 Results

 

Good afternoon,

 

Today, Symantec Corp. reported the results of its fourth quarter and the fiscal year 2011, ended April 1, 2011. GAAP revenue for the fiscal fourth quarter was $1.67 billion, up 9 percent year-over-year and up 8 percent after adjusting for currency. For the fiscal year, GAAP revenue was $6.19 billion, up 3 percent year-over-year and up 4 percent after adjusting for currency. 

Key highlights from this announcement:

·         GAAP operating margin for the fourth quarter of fiscal year 2011 was 14.3 percent (compared with 16.1 percent for the same quarter last year), GAAP net income was $168 million (compared with $184 million for the year-ago period), and GAAP diluted earnings per share were $0.22 (compared with $0.23 for the year-ago quarter).

·         Cash flow from operating activities for the fourth quarter of fiscal year 2011 was $689 million (compared with $703 million for the same quarter last year), and Symantec ended the quarter and fiscal year with cash, cash equivalents and short-term investments of $2.958 billion (an increase of 6 percent from 2010).

·         Non-GAAP operating margin for the fourth quarter of fiscal year 2011 was 24.1 percent (compared with 28.1 percent for the year-ago period), non-GAAP net income for the fourth quarter was $297 million (compared with $323 million for the year-ago quarter), and non-GAAP diluted earnings per share were $0.38 (compared with earnings per share of $0.40 for the year ago quarter).

·         Symantec’s Consumer segment represented 31 percent of total revenue and increased 6 percent year-over-year (5 percent after adjusting for currency), the Security and Compliance segment represented 27 percent of total revenue and increased 24 percent year-over-year (21 percent after adjusting for currency), the Storage and Server Management segment represented 37 percent of total revenue and increased 8 percent year-over-year (7 percent after adjusting for currency), and Services represented 5 percent of total revenue.

·         For the quarter, the VeriSign security business generated revenue of $61 million, and the PGP and GuardianEdge acquisitions generated revenue of $20 million.

·         A replay and script of today’s 5 p.m. ET/2 p.m. PT conference call to discuss the results from the fiscal fourth quarter and fiscal year 2011, ended April 1, 2011, will be available on the investor relations’ home page shortly after the call is completed.

For more information about this announcement or to speak with a Symantec spokesperson, please feel free to contact me.

 

Best,
Elana

 

Elana Ziluk

Account Coordinator | MAVERICK Public Relations

(416) 640-5525 x 243 | 37 Madison Avenue | Toronto | M5R 2S2

w: maverickpr.com | t: MAVERICK_PR


Symantec Reports Fourth Quarter Fiscal 2011 Results

Fourth Quarter

-          GAAP Revenue of $1.67 billion

-          Non-GAAP Operating Margin of 24.1 percent

-          Non-GAAP Earnings Per Share of $0.38

-          GAAP Deferred Revenue of $3.82 billion

-          Cash Flow from Operations of $689 million

 

Fiscal Year 2011

-          GAAP Revenue of $6.19 billion

-          Non-GAAP Operating Margin of 24.8 percent

-          Non-GAAP Earnings Per Share of $1.42

-          Cash Flow from Operations of $1.79 billion

 

TORONTO, ON – May 11, 2011 – Symantec Corp. (Nasdaq:SYMC) today reported the results of its fourth quarter and the fiscal year 2011, ended April 1, 2011. GAAP revenue for the fiscal fourth quarter was $1.67 billion, up 9 percent year-over-year and up 8 percent after adjusting for currency. For the fiscal year, GAAP revenue was $6.19 billion, up 3 percent year-over-year and up 4 percent after adjusting for currency. 

“We closed our fiscal year surpassing expectations across each of our key financial metrics, driven by market share gains and growth in backup, software-as-a-service, data loss prevention and consumer. In addition, our recent acquisitions performed above expectations for the third consecutive quarter,” said Enrique Salem, president and chief executive officer, Symantec. “Our rigorous approach to running  the business positions us well for fiscal year 2012, during which we will execute on our vision by energizing our core businesses and capitalizing on opportunities in mobile, cloud and virtualization.”

“We achieved record quarterly revenue and deferred revenue, as a result of strong bookings performance across all three regions,” said James Beer, executive vice president and chief financial officer, Symantec. “We continued to generate substantial cash flow from operations driven by the success of our sales efforts and our continuing focus on cost control.”

GAAP Results: GAAP operating margin for the fourth quarter of fiscal year 2011 was 14.3 percent compared with 16.1 percent for the same quarter last year. GAAP net income for the fiscal fourth quarter was $168 million compared with $184 million for the year-ago period. GAAP diluted earnings per share were $0.22 compared with $0.23 for the year-ago quarter.

For the fiscal year 2011, GAAP operating margin was 14.2 percent. GAAP net income for the fiscal year 2011 was $597 million. GAAP diluted earnings per share for the year were $0.76.

GAAP deferred revenue as of April 1, 2011, was $3.82 billion compared with $3.21 billion as of April 2, 2010, up 19 percent year-over-year and up 16 percent after adjusting for currency.

Cash flow from operating activities for the fourth quarter of fiscal year 2011 was $689 million compared with $703 million for the same quarter last year. Symantec ended the quarter and fiscal year with cash, cash equivalents and short-term investments of $2.958 billion. Cash flow from operating activities for fiscal year 2011 was $1.79 billion compared with $1.69 billion for fiscal year 2010, an increase of 6 percent.

Non-GAAP Results: Non-GAAP operating margin for the fourth quarter of fiscal year 2011 was 24.1 percent compared with 28.1 percent for the year-ago period. Non-GAAP net income for the fourth quarter was $297 million compared with $323 million for the year-ago quarter. Non-GAAP diluted earnings per share were $0.38 compared with earnings per share of $0.40 for the year ago quarter.

For the fiscal year 2011, Non-GAAP operating margin was 24.8 percent. Non-GAAP net income for the year was $1.12 billion. Non-GAAP diluted earnings per share were $1.42.

During the fourth quarter of fiscal year 2011, Symantec repurchased approximately 11 million shares for $180 million at an average price of $17.86. During the fiscal year 2011, the company repurchased 57 million shares at an average price of $15.39, equivalent to $870 million. Symantec has $877 million remaining in the current board authorized stock repurchase program.

Business Segment and Geographic Highlights

For the quarter, Symantec’s Consumer segment represented 31 percent of total revenue and increased 6 percent year-over-year (5 percent after adjusting for currency). The Security and Compliance segment represented 27 percent of total revenue and increased 24 percent year-over-year (21 percent after adjusting for currency). The Storage and Server Management segment represented 37 percent of total revenue and increased 8 percent year-over-year (7 percent after adjusting for currency). Services represented 5 percent of total revenue and declined 21 percent year-over-year (22 percent after adjusting for currency) as expected due to the company’s move to a partner-led consulting model.

International revenue represented 51 percent of total revenue in the fourth quarter of fiscal year 2011 and increased 10 percent year-over-year (8 percent after adjusting for currency). The Europe, Middle East and Africa region represented 29 percent of total revenue for the quarter and increased 4 percent year-over-year on an actual and currency-adjusted basis. The Asia Pacific/Japan revenue for the quarter represented 16 percent of total revenue and increased 22 percent year-over-year (12 percent after adjusting for currency). The Americas, including the United States, Latin America and Canada, represented 55 percent of total revenue and increased 9 percent year-over-year on an actual and currency-adjusted basis.

Acquisition Highlights

Recent acquisitions continue to perform better than expected. For the quarter, the VeriSign security business generated revenue of $61 million and the PGP and GuardianEdge acquisitions generated revenue of $20 million. The combined earnings per share dilution of these acquisitions was a penny and a half, which was half a penny better than expected.

For the fiscal year 2011, revenue from acquisitions was $186 million, exceeding expectations. The combined earnings per share dilution of these acquisitions was 8.5 cents, which was 2.5 cents better than expected.

First Quarter Fiscal Year 2012 Guidance

Guidance assumes an exchange rate of $1.42 per Euro for the June 2011 quarter versus the actual weighted average and end of period rate of $1.26 per Euro for the June 2010 quarter. 

For the first quarter of fiscal year 2012, ending July 1, 2011, revenue is estimated between $1.570 billion and $1.590 billion, up 10 to 11 percent year-over-year as reported.

GAAP diluted earnings per share are estimated between $0.19 and $0.20. Non-GAAP diluted earnings per share are estimated between $0.36 and $0.37.

Deferred revenue is expected to be in the range of $3.60 billion and $3.63 billion, up 20 to 21 percent year-over-year as reported.

Conference Call

Symantec has scheduled a conference call for 5 p.m. ET/2 p.m. PT today to discuss the results from the fiscal fourth quarter and fiscal year 2011, ended April 1, 2011, and to review guidance.  Interested parties may access the conference call on the Internet at http://www.symantec.com/invest. To listen to the live call, please go to the Web site at least 15 minutes early to register, download and install any necessary audio software. A replay and script of our officers’ remarks will be available on the investor relations’ home page shortly after the call is completed.

About Symantec

Symantec’s Canadian operations are headquartered in Toronto with offices in Montreal, Ottawa, Calgary and Vancouver.  For more information on Symantec products or current promotions, access Symantec’s Canadian Web site at www.symantec.ca. Symantec is an active member of the Business Software Alliance (BSA).

 

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

###

NOTE TO EDITORS: If you would like additional information on Symantec Corporation and its products, please visit the Symantec News Room at http://www.symantec.com/news. All prices noted are in U.S. dollars and are valid only in the United States.

 

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Forward-looking Statements: Any forward-looking indication of plans for products or programs is preliminary and all future release or delivery dates are tentative and are subject to change. Any future program plans, or release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making program participation or product purchasing decisions.

 

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

 

FORWARD-LOOKING STATEMENTS: This press release contains statements regarding our financial and business results, which may be considered forward-looking within the meaning of the U.S. federal securities laws, including projections of future revenue, earnings per share and deferred revenue, as well as projections of amortization of acquisition-related intangibles and stock-based compensation and restructuring charges. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, levels of activity, performance or achievements to differ materially from results expressed or implied in this press release. Such risk factors include those related to: general economic conditions; maintaining customer and partner relationships; the anticipated growth of certain market segments, particularly with regard to security and storage; the competitive environment in the software industry; changes to operating systems and product strategy by vendors of operating systems; fluctuations in currency exchange rates; the timing and market acceptance of new product releases and upgrades; the successful development of new products and integration of acquired businesses, and the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking statements in this press release. We assume no obligation, and do not intend, to update these forward-looking statements as a result of future events or developments. Additional information concerning these and other risks factors is contained in the Risk Factors sections of our Form 10-K for the year ended April 2, 2010.

USE OF NON-GAAP FINANCIAL INFORMATION: Our results of operations have undergone significant change due to a series of acquisitions, the impact of SFAS 123(R), impairment charges and other corporate events.  To help our readers understand our past financial performance and our future results, we supplement the financial results that we provide in accordance with generally accepted accounting principles, or GAAP, with non-GAAP financial measures.  The method we use to produce non-GAAP results is not computed according to GAAP and may differ from the methods used by other companies.  Our non-GAAP results are not meant to be considered in isolation or as a substitute for comparable GAAP measures and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. Our management regularly uses our supplemental non-GAAP financial measures internally to understand, manage and evaluate our business and make operating decisions. These non-GAAP measures are among the primary factors management uses in planning for and forecasting future periods.  Investors are encouraged to review the reconciliation of our non-GAAP financial measures to the comparable GAAP results, which is attached to our quarterly earnings release and which can be found, along with other financial information, on the investor relations’ page of our Web site at www.symantec.com/invest.

 


(download)

EMC WORLD 2011 NEWS RELEASE: EMC Unveils Mobile User Interface for Apple iPad

FOR IMMEDIATE RELEASE

EMC Unveils Mobile User Interface for Apple iPad

New EMC User Interface to Support the “New User” of Post-PC Era

News Summary:
* EMC® unveils its first new mobile user interface for the Apple iPad.

* New EMC Information Intelligence Group (IIG) user interface supports
the new user demand for increased mobility and Choice computing.
* New post-PC era user demands driving EMC IIG strategy to deliver new
user interfaces across product portfolio.

Full Story:

EMCWORLD 2011 – LAS VEGAS – May 11, 2011 – EMC Corporation (NYSE:
EMC) today unveiled its first mobile user interface for the Apple iPad,
with plans to support subsequent tablets and smartphones in the future.
The new mobile user interface is a key piece of EMC’s strategy and
roadmap focused on user experience, choice computing and agility.

New User Interface for Mobility and Unification

IIG’s new interface, demonstrated for the first time at EMC World, is
optimized for usability and performance on specific form factors. Built
using RESTful Services, EMC’s new mobile interface will initially
support casual consumption and light authoring of content for the Apple
iPad, with support for other tablet and smartphone platforms to follow.
In addition to delivery of mobile applications on a regular cadence, EMC
will enable partners and customers to develop mobile solutions and
applications on top of its platform. Existing licensed users of EMC
Documentum® user interfaces will have access to these mobile interfaces
at no additional cost.

EMC also announced an open and standards based UI approach leveraging
industry-leading technologies that will unify its content management,
collaboration, case management and rich media clients over time. As a
proof point of this, EMC announced general availability of CenterStage®
1.2 which adds basic content management capabilities to its enterprise
collaboration foundation. This version of CenterStage adds read/write
repository access, a container-based security model to easily gain
access to content, as well as single sign-on support.

The New User of the Post-PC Era

The “new user” of the Post-PC era is the impetus driving EMC’s
client/user interface strategy, as new endpoint devices provide an
opportunity for rich innovation. The strategy includes making the user
experience compelling, fast and modern; cloud-enabled; inclusive for the
active developer ecosystem, and deliver flexibility for composing new
solutions.

“As cloud computing continues to become mainstream and mobile- and
tablet-based devices proliferate, EMC is pleased to leverage leading
technologies to extend and enhance the delivery of our user
interfaces,” said Jeetu Patel, Chief Strategy Officer, Information
Intelligence Group Division of EMC. “Choice computing leads to a new
wave of innovation, which we embrace as an opportunity to lead. Our UI
roadmap responds to key market trends, like mobility, and reinforces our
commitment to delighting the information worker.”

At EMC World, Jeetu Patel and Rohit Ghai, Vice President of Product
Development, will host a session to further explain EMC’s User
Interface strategy. For more information on sessions at EMC World,
please visit:
http://www.emcworld.com/images/Momentum_2011_Agenda-master4webpage.pdf.

Follow EMC World Online

To track the latest EMC World 2011 happenings visit the EMC World
Newsroom at www.emc.com/emcworldnewsroom.

For continuous EMC World news and event updates, follow (ADD our IIG
Feed) http://twitter.com/emcworld and http://twitter.com/emccorp.

Availability

EMC is targeting the new user interface to be available later this
year.

About EMC

EMC Corporation (NYSE: EMC) is the world’s leading developer and
provider of information infrastructure technology and solutions that
enable organizations of all sizes to transform the way they compete and
create value from their informa
tion. Information about EMC’s products
and services can be found at www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Michelle Chang/Mike Martin
StrategicAmpersand
416-961-5595
michelle@stratamp.com
mike@stratamp.com


EMC, Documentum, and CenterStage are registered trademarks or
trademarks of EMC Corporation in the United States and other
countries.All other trademarks used herein are the property of their
respective owners.

Forward-Looking Statement:
This release contains “forward-looking statements” as defined under
the Federal Securities Laws. Actual results could differ materially from
those projected in the forward-looking statements as a result of certain
risk factors, including but not limited to: (i) adverse changes in
general economic or market conditions; (ii) delays or reductions in
information technology spending; (iii) the relative and varying rates of
product price and component cost declines and the volume and mixture of
product and services revenues; (iv) competitive factors, including but
not limited to pricing pressures and new product introductions; (v)
component and product quality and availability; (vi) fluctuations in
VMware, Inc.’s operating results and risks associated with trading of
VMware stock; (vii) the transition to new products, the uncertainty of
customer acceptance of new product offerings and rapid technological and
market change; (viii) risks associated with managing the growth of our
business, including risks associated with acquisitions and investments
and the challenges and costs of integration, restructuring and achieving
anticipated synergies; (ix) the ability to attract and retain highly
qualified employees; (x) insufficient, excess or obsolete inventory;
(xi) fluctuating currency exchange rates; (xii) threats and other
disruptions to our secure data centres or networks; (xiii) our ability
to protect our proprietary technology; (xiv) war or acts of terrorism;
and (xv) other one-time events and other important factors disclosed
previously and from time to time in EMC’s filings with the U.S.
Securities and Exchange Commission. EMC disclaims any obligation to
update any such forward-looking statements after the date of this
release.


If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.

EMC WORLD 2011 NEWS RELEASE: EMC Launches Information Intelligence Group Global Partner Program

 

FOR IMMEDIATE RELEASE

EMC Launches Information Intelligence Group Global Partner Program

Delivers New, World-Class Programs and Certifications to Bring
High-Value Business Solutions for Customers

News Summary:

* New EMC® Information Intelligence Group Partner Program launched to
provide partners access to entire IIG product portfolio
* New “EMC Certified Solution” designation – replacing
“Designed for EMC” program – enables System Integrators and
ISVs to develop complete solutions and hosted services
* New EMC Information Intelligence Reseller Program enables partners
who are accredited as EMC Proven Professionals to resell IIG software
and services
* New Information Intelligence Services Partner Program enables
certified partners to deliver installation and implementation services
for IIG products and solutions

For the multimedia version of this press release and related content,
please go to: http://www.emc.com/about/news/press/2011/20110511-01.htm

Full Story:

LAS VEGAS (Momentum @ EMC World) – May 11, 2011 – EMC Corporation
(NYSE: EMC), the world leader in information infrastructure solutions,
today announced a comprehensive new program to help partners build,
sell, deploy and support solutions created with Information Intelligence
Group (IIG) products. The new EMC IIG Partner Program provides partners
access to the entire IIG portfolio, including Enterprise Content
Management solutions, Documentum® xCP and Information Governance
SourceOne™ offerings, and offers a new “EMC Certified Solution”
designation. The new program will be launched at the first IIG Partner
Conference, part of Momentum, at EMC World.

The IIG Partner Program is designed to improve the total customer
experience, ensuring partners are trained, certified and fully equipped
to deliver global customers the quality, value and consistency expected
from EMC. The program offers partners access to solution architects and
developer level support, specialized training and professional
certification, and enhanced technical certification for solutions
developed by IIG. Partners who have achieved EMC Certified Professional
accreditation and offer EMC Certified Solutions will have greater
visibility and preference with customers.

“As companies move to the cloud and explore new ways to transform
their business, ‘technology’ loses out to ‘solutions’ and
‘expertise.’ This is why we’re so pleased to deliver our new
partner program and set of initiatives, as we’re confident this new
EMC partner ecosystem will enable customers to achieve high-impact
results quicker than ever before,” said Chris McLaughlin, Vice
President of Channels and Alliances for IIG, a Division of EMC. “As
EMC increases its focus on delivering total solutions, working with
selected, certified partners gives customers the confidence to rely on
us for their business-critical processes.”

The program consists of the following initial elements:

* EMC Information Intelligence Partner Program enables System
Integrators and ISVs to develop complete solutions and hosted services
that extend, complement, or embed IIG’s full portfolio. As part of
this effort, EMC has launched a new ”EMC Certified
Solution”designation, which ensures partner-built solutions have
undergone rigorous validation by EMC solution architects and a third
party certification vendor. “EMC Certified Solution” replaces the
“Designed for EMC” program.

* EMC Information Intelligence Reseller Program, which mirrors the EMC
Velocity program, enables partners who are accredited as EMC Proven
Professionals to resell IIG software and services. IIG resellers can
purchase directly from EMC or from a Velocity² Distributor, and resell
customers a variety of value-added services such as IT integration
experience, product expertise, and a specific IIG application focus.

* EMC Information Intelligence Services Partner Program
 enables
certified partners to deliver installation and implementation services
for IIG products and solutions. These partners are trained and certified
to deliver a comprehensive portfolio of best-in-class installation and
implementation. EMC Professional Certification is required for each IIG
product deployed by these services partners.

The new EMC IIG Partner Program offers a number of value-added
offerings to IIG partners, including:

* Enablement through enhanced training and professional certification:
Through the EMC Proven Professional effort, IIG offers certifications
for technical Roles as well as specific products and technology areas.
Maintaining EMC Professional Certification is required for the EMC
Solution Provider and Service Provider partners.

* Marketing investments for EMC Certified Solutions: Partner solutions
that successfully achieve the EMC Certified Solution designation will be
highlighted in the new EMC Solution Catalog and Solution Gallery on
EMC.com. Following certification, EMC will work with partners to develop
collateral, demand generation campaigns, and sales support materials and
training for the global field organization.

* Opportunity Registration: This initiative boosts partner
profitability by providing financial incentives, rewarding partners’
value-add activities, and incenting partners’ presales investment in
new deals. Partners earn entitlement to additional discount on
incremental deals they register as the partner of record. Opportunity
registration applies whether a partner intends to resell IIG products
and services alone, or jointly work with the EMC IIG sales team. When
working with the EMC IIG sales team, partners are eligible to apply for
Marketing Assistance Funds (MAF) through this program to offset presales
investments, funding for joint marketing activities and continuing
partner education.

* Streamlined Partner Relationship Management: EMC Partner Central is a
new partner relationship management tool designed to help partners track
the various elements of their business transactions with EMC more
efficiently and with greater speed and service. With EMC Partner
Central, partners can also manage their EMC profile, review channel
plans, and monitor their program compliance and eligibility for
benefits.

IIG Partner Conference: May 12, 2011

EMC will host a one-day IIG Partner Conference on Thursday May 12, 2011
at the Venetian in Las Vegas. Partners will receive information on the
new programs, learn details on our product roadmap and gain access to
new sales and go-to-market tools. Along with launching the new Partner
Program, the conference includes keynotes and discussions with IIG
executives and dedicated, in-depth sessions with IIG Product Management,
Sales and technical teams.

EMC will also celebrate partners’ success with the IIG Partner
Innovation Awards, which recognize partners for excellence across a
variety of categories including innovation in solution development,
customer satisfaction and design integration, and best practices in
implementation and deployment.

For more information or to register, visit:
www.emc.com/IIGpartnerconference. To track the latest EMC World 2011
happenings visit www.emc.com/emcworld2011.

About the EMC IIG Product Offerings

EMC IIG provides intelligent capture, case management, customer
communications and governance software and services that solve even the
most complex information challenges organizations face today – from
information compliance and governance to streamlining mission critical
business processes, on premise or in the cloud.

By connecting the right information with the right people and
processes, EMC information intelligence solutions prime organizations to
make insightful, informed decisions that propel their businesses
forward, securely and with heightened business and IT efficiency and
reduced operating expenses.

About EMC

EMC Corporation (NYSE: EMC) is the world’s leading developer and
provider of
 information infrastructure technology and solutions that
enable organizations of all sizes to transform the way they compete and
create value from their information. Information about EMC’s products
and services can be found at www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Michelle Chang/Mike Martin
StrategicAmpersand
416-961-5595
michelle@stratamp.com
mike@stratamp.com


EMC, Documentum and SourceOne are trademarks or registered trademarks
of EMC in the U.S. and other countries. Other trademarks are the
properties of their respective owners.


This release contains “forward-looking statements” as defined under
the Federal Securities Laws. Actual results could differ materially from
those projected in the forward-looking statements as a result of certain
risk factors, including but not limited to: (i) adverse changes in
general economic or market conditions; (ii) delays or reductions in
information technology spending; (iii) the relative and varying rates of
product price and component cost declines and the volume and mixture of
product and services revenues; (iv) competitive factors, including but
not limited to pricing pressures and new product introductions; (v)
component and product quality and availability; (vi) fluctuations in
VMware, Inc.’s operating results and risks associated with trading of
VMware stock; (vii) the transition to new products, the uncertainty of
customer acceptance of new product offerings and rapid technological and
market change; (viii) risks associated with managing the growth of our
business, including risks associated with acquisitions and investments
and the challenges and costs of integration, restructuring and achieving
anticipated synergies; (ix) the ability to attract and retain highly
qualified employees; (x) insufficient, excess or obsolete inventory;
(xi) fluctuating currency exchange rates; (xii) threats and other
disruptions to our secure data centres or networks; (xiii) our ability
to protect our proprietary technology; (xiv) war or acts of terrorism;
and (xv) other one-time events and other important factors disclosed
previously and from time to time in EMC’s filings with the U.S.
Securities and Exchange Commission. EMC disclaims any obligation to
update any such forward-looking statements after the date of this
release.


If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.

Trusteer Blog - Windows Malware Morphs into Financial Fraud Platform


Windows Malware Morphs into Financial Fraud Platform
We recently identified a little known Windows malware platform that has been in circulation for some time, but was never previously recognized for its financial fraud capabilities. We named it Sunspot.

It is currently targeting North American financial institutions and has already achieved SpyEye and Zeus–like infection rates in some regions. There are confirmed fraud losses associated with Sunspot, so the threat is real. Sunspot is another example of the growing list of financial malware that is flooding the Internet. In addition to Sunspot, Trusteer alone also has discovered several malware platforms over the past 18 months including Silon, OddJob and several others.

Sunspot targets 32-bit and 64-bit Windows platforms from Windows XP through Windows 7, and is capable of installing in non-administrator and administrator accounts. Once installed, it targets Internet Explorer and Firefox browsers. This is a very modern malware platform with sophisticated fraud capabilities. Equally concerning, the detection rate for Sunspot by leading anti-virus programs is painfully low. According to a Virus Total analysis, only nine of 42 anti-virus programs tested, or 21%, currently detect Sunspot.

It can carry out man-in-the-browser attacks including web injections, page grabbing, key-logging and screen shooting (which captures screenshots of the mouse vicinity as a user types his/her password on a virtual keyboard). We were able to decrypt and analyze its configuration, which includes instructions to execute the following fraud focused actions:

• “Grab” account balance figures, last login date, etc.

• Request additional online banking details from the user (such as full security PIN/password, Answers to secret questions)

• Request payment card information (card number, ATM PIN, CVV, expiration date)

• Request personal information (driver license, mother maiden name, date of birth)

• Take screenshots of the mouse vicinity as the user types his/her password on a virtual keyboard (Screen Shooting).

We traced the Sunspot Command and Control Server (C&C) hostname to a domain registered in Russia.

Once installed, Sunspot is started either by "rundll32.exe" via HKCU\Software\Microsoft\Windows\CurrentVersion\Run or via HKLM\SOFTWARE\Microsoft\Active

Setup\Installed Components. It uses CBT hooking to load its DLL into the browser (Internet Explorer/Firefox). Inside the browser it hooks several Wininet/NSPR4/user32 functions for web injections, page grabbing and key-logging.

Sunspot is interesting for two reasons.

First, it reveals a new approach to financial malware development. Unlike purpose built financial fraud platforms like Zeus, SpyEye, Bugat, and others, it appears Sunspot was not originally developed as crime ware. If this is the case, we could be witnessing a sea change in malware development where general purpose and little know malware platforms are re-programmed to carry out financial fraud. This will make it even more difficult to defend against attacks since banks will be ambushed by a growing number of unique financial malware platforms.

Second, Sunspot illustrates an increasing emphasis by crime ware authors on payment card theft. We are seeing more and more malware asking victims for their credit and debit card information together with additional identifiable information. This allows criminals to commit card non present fraud on the Internet, and also makes it more difficult for banks to identify the source of fraudulent transactions since they cannot trace it back to a specific computer. We believe that a significant percentage of fraudulent card not present transactions today originate from malware.

The take away for financial institutions from Sunspot remains the same. A layered security approach that combines server-side and client-side zero day attack protection  is the most effective way to protect users against crime ware, since anti-virus programs are lagging way behind in their ability to detect these programs.

###-----------------------------------------------------------------------
This message was sent to editor. If you no longer wish to receive email from us, please follow the link below or copy and paste the entire link into your browser. http://www.xmr3.com/rm/1517061-44509843-2-15-AV1-5B0F/pr@itincanada.ca/HCS8371

SYMANTEC VoR: Facebook Applications Accidentally Leaking Access to Third Parties

 

May 10, 2011

 

Facebook Applications Accidentally Leaking Access to Third Parties

 

By: Nishant Doshi

Third parties, in particular advertisers, have accidentally had access to Facebook users’ accounts including profiles, photographs, chat, and also had the ability to post messages and mine personal information. Fortunately, these third-parties may not have realized their ability to access this information. We have reported this issue to Facebook, who has taken corrective action to help eliminate this issue.

Facebook applications are Web applications that are integrated onto the Facebook platform. According to Facebook, 20 million Facebook applications are installed every day.

Symantec has discovered that in certain cases, Facebook IFRAME applications inadvertently leaked access tokens to third parties like advertisers or analytic platforms. We estimate that as of April 2011, close to 100,000 applications were enabling this leakage. We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties.

Access tokens are like ‘spare keys’ granted by you to the Facebook application. Applications can use these tokens or keys to perform certain actions on behalf of the user or to access the user’s profile. Each token or ‘spare key’ is associated with a select set of permissions, like reading your wall, accessing your friend’s profile, posting to your wall, etc.

Figure 1. illustrates some of these permissions.

http://www.symantec.com/connect/imagebrowser/view/image/1763821/_original

Figure 1

During the application installation process, the application requests the user to grant permissions to these actions. Upon granting these permissions, the application gets an access token as seen in Figure 2.

http://www.symantec.com/connect/imagebrowser/view/image/1763831/_original

Figure 2

Using this access token, the application can now access the user’s information or perform actions on behalf of the user.

https://graph.Facebook.com/me/accounts?access_toke...

By default, most access tokens expire after a short time, however the application can request offline access tokens which allow them to use these tokens until you change your password, even when you aren’t logged in.

How does the access token get leaked?

By default, Facebook now uses OAUTH2.0 for authentication. However, older authentication schemes are still supported and used by hundreds of thousands of applications. When a user visits apps.Facebook.com/appname , Facebook first sends the application a limited amount of non-identifiable information about the user, such as their country, locale and age bracket. Using this information, the application can personalize the page.

The application then needs to redirect the user to a permission dialog page, as seen here.

http://www.symantec.com/connect/imagebrowser/view/image/1763841/_original

Figure 3

The application uses a client-side redirect for redirecting the user to the familiar application permission dialog box. This indirect leak could happen if the application uses a legacy Facebook API and has the following deprecated parameters, "return_session=1" and "session_version=3", as part of their redirect code, as seen in Figure 4.

http://www.symantec.com/connect/imagebrowser/view/image/1763851/_original

Figure 4

If these parameters are used, Facebook subsequently returns the access token by sending an HTTP request containing the access tokens in the URL to the application host.

 The Facebook application is now in a position to inadvertently leak the access tokens to third parties potentially on purpose and unfortunately very commonly by accident. In particular, this URL, including the access token, is passed to third-party advertisers as part of the referrer field of the HTTP requests.

For example, if this application’s first page was requesting resources from an external URL using an iframe tag from an advertiser, then the access token will get leaked in the referrer field. This is illustrated in Figure 5.

http://www.symantec.com/connect/imagebrowser/view/image/1763861/_original

Figure 5

Conclusion

Needless to say, the repercussions of this access token leakage are seen far and wide. Facebook was notified of this issue and has confirmed this leakage. Facebook notified us of changes on their end to prevent these tokens from getting leaked.

There is no good way to estimate how many access tokens have already been leaked since the release Facebook applications back in 2007. We fear a lot of these tokens might still be available in log files of third-party servers or still being actively used by advertisers. Concerned Facebook users can change their Facebook passwords to invalidate leaked access tokens. Changing the password invalidates these tokens and is equivalent to “changing the lock” on your Facebook profile.

Nishant Doshi and Candid Wueest from Symantec are credited with the discovery of this issue.

Facebook has recently announced an update to their Developer RoadMap. The details of this update can be found here: https://developers.facebook.com/blog/post/497

 


(download)

: AT&T TARGETS CLOSE TO $1 BILLION OF INVESTMENT FOR BUSINESSES


 

 

 

 

AT&T TARGETS CLOSE TO $1 BILLION OF INVESTMENT TO DEPLOY GLOBAL NETWORK-BASED CLOUD AND MOBILITY SOLUTIONS FOR BUSINESSES

 

Company to Focus on New-Generation Services Like Mobile Applications, ‘as-a-Service’ Cloud Based Solutions and Network Sourcing for Companies of All Sizes Across Multiple Industries

 

 

DALLAS, May 10, 2011 — Responding to demand for solutions that help businesses dramatically improve productivity and efficiency and reduce costs, AT&T* today said that it is focusing its plans to deploy global network-based cloud, mobility and network sourcing solutions to companies across a range of industries.

AT&T is planning investments totaling nearly $1 billion in 2011 to deploy next-generation services for businesses ranging from the smallest firms to the world’s largest and most sophisticated multinational companies. (Note: the nearly $1 billion investment is part of AT&T’s previously announced planned $19 billion capital budget for 2011).  The new services are largely made possible by the unprecedented proliferation of high-speed wired and wireless networks, smart mobile computing devices and network-based applications. 

The company intends to invest in five key focus areas – like enterprise mobility applications and cloud/as-a-service enhancements – while also rolling out platforms, systems and e-capabilities to significantly automate, enhance and simplify business customers’ experience and support. 

AT&T is targeting its investment to companies, government agencies and institutions in industries such as manufacturing, retail, hospitality, healthcare and automotive.

“We continue to invest significantly in cloud-based, mobility and network sourcing solutions because customers are increasingly recognizing that transformative services like these increase productivity, improve operational effectiveness and lower costs, ” said John Stankey, president and CEO of AT&T Business Solutions,

Revenues from these and other new-generation capabilities which represent AT&T's most advanced business solutions — including ethernet, virtual private networks, hosting, IP conferencing and application services — grew 18.8 percent in Q1 2011 versus the year-earlier quarter -- their strongest growth in more than two years.  Looking at key individual solutions in the same period, international revenues for virtual private networks, hosting revenues, and network sourcing revenues all achieved double digit percentage year-over-year quarterly growth outside of the U.S.

 

AT&T’s 2011 investment priorities for business customers include:

 

·           Advanced Mobility Solutions and Connected Devices: In 1Q 2011, AT&T added 1.6 million emerging devices, which included connected devices and embedded computing devices such as tablets, netbooks, and laptops.  More than 12 million emerging devices are now connected to the AT&T network.   AT&T has seen the use of mobile applications triple since 2009.

·           Cloud Based and Emerging Services: AT&T has embedded cloud capabilities directly into its network so that the company can manage and deliver services and applications as part of a total solution to any device.  These services offer customers tremendous flexibility and shared economics for their compute and storage needs – and are all protected by AT&T’s industry-leading network-based security solutions. 

 

·           Global Enterprise Networking:  AT&T has focused investment in business-focused networks, systems and applications to provide a globally consistent set of robust and highly-secure services for our 1700 target multinational customers.  More than 70 percent of AT&T's frame relay customers have made the transition to IP-based solutions, which allow them to easily add managed services such as network security, cloud services and IP conferencing on top of their infrastructures.  

·           Small Business Services:  To serve its more than 3 million small- and medium-sized business customers in the U.S., AT&T is continuing to invest in delivering new and simplified service bundles and increasing download speeds within its existing 22- state broadband footprint.

·         Healthcare Industry Focus:  Building on the successful launch of AT&T ForHealthSM practice area in 2010, AT&T plans to continue to accelerate the delivery of innovative wireless, cloud-based and networking services and applications to help the healthcare industry improve patient care and reduce costs.

 

AT&T’s business customers include all of the Fortune 1000 companies, over 50% of the FTSE companies, more than 85% of the CAC 40 companies, over 80% of the DAX companies and over 60% of the Nikkei 225 companies.

 

Find More Information Online:

 

Web Site Links:

Related Media Kits:

AT&T Web Site

AT&T Enterprise Services

AT&T Small Business InSite

AT&T Small Business Services

 

AT&T Global Network

AT&T Internet Protocol Virtual Private Network

AT&T Application Acceleration

AT&T ForHealth

AT&T Enterprise Hosting Services

AT&T Small Business

AT&T Enterprise Hosting Services

AT&T Mobility Solutions

 

Related Releases:

Related Fact Sheets:

AT&T Plans $1 Billion Investment in 2010 in Network Capabilities, Solutions and Applications for Businesses

 

AT&T Well Positioned in Global Network Service Providers and Pan - European Network Service Providers Magic Quadrants

 

 

AT&T's Global Networking Facts

 

 

 

 

 

 

 

LogRhythm Expert - Using SIEM and Hacking for More Secure IT

 

NEWS RELEASE
FOR IMMEDIATE DISTRIBUTION

LogRhythm Expert to Discuss Using Hacking Techniques and SIEM Technology for Security Investigations at Civilian and Military Conferences

Certified Ethical Hacker Eric Knight to Present at ISACA North America and Air Force Systems and Software Technology Conferences

BOULDER, Colo., May 10, 2011 – LogRhythm, the company that makes log data useful, today announced that senior knowledge engineer and certified ethical hacker Eric Knight will discuss at two leading industry conferences this month methods for using hacking techniques and SIEM technology to discover security risks and exposures. Mr Knight has been invited to speak at ISACA’s North America Computer Audit, Control and Security (North America CACS) Conference and the US Air Force Systems and Software Technology Conference. He will demonstrate how to detect and perform forensic investigations into suspicious activity.

“Security Information and Event Management (SIEM) tools allow for deep investigation of security events on computer networks, if you know where and what to look for,” said Eric Knight. “They can provide a multi-faceted view of security incidents, including tracing a terminated user’s activities, tracking a malware outbreak and assessing the damage it caused, and dissecting a suspected breach. This is what I will be demonstrating in these hands-on presentations.”

Eric Knight, MIS, CISSP, CISM, CEH, is senior knowledge engineer at LogRhythm. Mr. Knight is responsible for building compliance intelligence packages for regulatory mandates that are shipped as part of LogRhythm’s award-winning SIEM 2.0 platform. He has over 15 years of experience in the field of network security with an emphasis in vulnerability management and enterprise security architectures. His prior roles include principal consultant with IT systems integrator CIBER, software security architect at the North American Aerospace Defense Command (NORAD), and software development for DMW Worldwide and Trident Data Systems. Eric has presented at CSI, the Computer Forensics Show, and several ISACA events.

Conference Dates/Locations

Mr. Knight will present on the following dates:

ISACA North America CACS Conference

Paris Las Vegas Hotel

Las Vegas, Nevada

May 17, 1:30pm - 3:00pm


US Air Force Systems and Software Technology Conference (SSTC 2011)

Salt Palace Convention Center

Salt Lake City, Utah

May 19, 8:00am - 8:45am

About LogRhythm

LogRhythm, the leader in log management and SIEM 2.0, delivers log and event management, file integrity monitoring, and network and user monitoring in a single integrated solution. LogRhythm empowers organizations to comply with regulations, secure their networks, and optimize IT operations. The company received the coveted “Recommended” 5-star designation from SC Labs for SIEM and has received SC Magazine’s Innovator of the Year Award, Readers Trust Award for “Best SIEM” solution and the “Best Buy” designation for Digital Forensics. It is a winner of the 2010 Red Herring 100 Award and was placed by Gartner Inc. in the visionaries quadrant of the Security Information and Event Management (SIEM) Magic Quadrant report for 2010. LogRhythm is privately held and based in Boulder, Colorado with European Headquarters in Maidenhead, England, and Asia Pacific operations in Hong Kong. For more information visit: www.logrhythm.com.

###-----------------------------------------------------------------------
This message was sent to editor. If you no longer wish to receive email from us, please follow the link below or copy and paste the entire link into your browser. http://www.xmr3.com/rm/1517061-45918600-2-20-AV1-CCBE/pr@itincanada.ca/HCS8371

Survey shows significant growth in online group-buying activity in Canada in the last year

 

Spontaneity and Selfishness: The Inside Scoop on Group Buying in Canada

 

 Survey reveals Canadians who visit group buying sites make unplanned purchases for self

 

TORONTO, May 10, 2011 When it comes to great retail deals, Canadians who visit group buying sites spontaneously self-indulge. The Canadian Group Buying Survey conducted by Vision Critical on behalf of OneSpout.com reveals Canadians who group buy overwhelmingly make unplanned purchases, and the vast majority of deal-seekers purchase for one recipient ― themselves.

 

“We conducted the Canadian Group Buying Survey to create a benchmark for our burgeoning industry and to take the pulse of what really motivates Canadians who visit group buying sites,” said Antonio Rodriguez, president, OneSpout.com, the leading group buying deal aggregator in Canada. “We wanted to see how Canadians who visit group buying sites act in the face of phenomenal discounts and some of the findings were surprising.”

 

The survey revealed:

 

·         A large majority (81%) of people who purchase from a group buying site are buying for themselves.

·         Almost three-quarters (73%) of Canadians who purchase through group buying sites said the sites encourage them to purchase products and services they weren’t looking for.

 

Other key survey findings include:

 

Irresistible discounts encourage group buyers to try something new

Interestingly, 40 per cent of survey respondents said they specifically liked group buying sites because it allowed them to buy or try something they normally wouldn’t at regular price.  While restaurant deals are the most popular unplanned purchase (58%) with respondents who purchased something unplanned, spa services are particularly favourable among women, with 32 per cent of women purchasing spa services they weren’t looking for, compared to 20 per cent of men.  The survey also discovered among people who tried something new because of group buying:

 

·         Almost one quarter (22%) purchased unplanned recreational activities.

·         Almost one-in-five (15%) bought a gym/fitness/yoga deal they weren’t looking for.

·         Just over one-in-10 (13%) spontaneously purchased an adventure experience.

·         One-in-10 (10%) purchased an unplanned cosmetic procedure.

 

Significant growth in past year

One year ago the group buying industry was little known in Canada.  Today, 49 per cent of Canadians have visited a group buying site and over two-thirds (68%) of Canadians who use group buying sites started doing so within the past six months.  As with many trends, the popularity of group buying is led by younger, Canadians and is gradually spreading to older Canadians. The survey revealed those aged 18-34 (25%) are more-than-twice as likely as Canadians aged 55-plus (10%) to have made a purchase from a group buying site.

 

Respondents cited various factors when asked what they personally like about group buying:

 

·         Consumers like the convenience of getting deals online (35%).

·         They like being introduced to new local deals in their city (34%).

·         It allows them to find only the deals they are interested in (33%).

·         It lets them buy more because they save money (26%).

·         It lets them give a more substantial gift for their budget (20%).

·         It allows them to easily share deals with their friends, colleagues and family (17%).

 

Savings are matching spending

Whether they take a quick look as part of their daily routine or scour the listings more thoroughly a couple of times a week, Canadians who visit group buying sites say they save as much as they spend on the sites:

 

·         The majority (91%) of those who have made a purchase on the sites have spent up to $449 in the past 12 months

·         Well over three-quarters (86%) of respondents say they have saved up to $449 –  the same amount as they have spent ― in the last 12 months

·         One-in-10 (10%) respondents have saved from $500 to $1,000 during the same time period

 

Searching for deals at work and home

Today, over one-third (36%) of Canadians who visit group buying sites have purchased a deal.  And those who have visited keep returning. The survey revealed that four-in-10 (42%) who visit group buying sites spend some of their spare time doing so, and one-in-five (19%) of those with Internet access do so daily at work.

 

Unsophisticated industry in Canada

“Although the marketplace for group buying is rapidly growing, the industry is still unsophisticated in Canada,” says Rodriguez. “To build long term relationships with Canadian consumers, industry leaders like OneSpout.com need to help consumers save time and money by providing them with relevant deals they really want based on type of product or service, and location.”

 

About the Canadian Group Buying Survey

From April 7th to April 11th, 2011, Vision Critical conducted an online survey among a sample of 1,014 adult Canadians that have purchased a deal from a group buying site or have visited a group buying site and never purchased a deal, and who are Angus Reid Forum panel members. The margin of error—which measures sampling variability—is +/- 3.0%. The results have been statistically weighted to ensure a representative sample. Discrepancies in or between totals are due to rounding.

 

About OneSpout.com

OneSpout.com makes it easy for consumers to access all the local group buying deals they want close to home, work or any location of interest through a single daily e-mail. As a result, consumers can sign up with OneSpout.com and unclutter their inbox by unsubscribing from all other group buying site emails. OneSpout.com is also leading the next wave of group buying through its ease of use, great deals, and personalized screening tools. Founded in 2010, OneSpout.com is now used by more than 100,000 Canadians seeking deals, making it the leading group buying deal aggregator in Canada. For more information, visit www.onespout.com.

 

-30-

Antonio Rodriguez

President and CEO

OneSpout.com

As President and CEO of OneSpout.com, Antonio Rodriguez is guiding OneSpout.com to lead the next wave in the group buying industry.

Along with co-founder Al-Amin Mithani, Antonio developed OneSpout.com from the simple premise that there were dozens of sites offering amazing group buying deals, but they hated receiving dozens of daily e-mails. So instead of complaining about it, they built a solution that focused on personalization that has evolved into the next wave of group buying.

Prior to OneSpout.com, Antonio was a software developer for K2 & Associates, one of Canada’s top performing hedge funds. Antonio also worked as a programmer for RBC Capital Markets and Deutsche Bank in their respective quantitative trading groups.

Antonio holds a Bachelor of Software Engineering degree from the University of Waterloo.

 

 

TWO EMC WORLD 2011 PRESS RELEASES: EMC Delivers “Cloud to Ground” Root-Cause Analysis for Data Centres; EMC and Box Deliver Enterprise Content Management Mobility through the Cloud

 

----------
FOR IMMEDIATE RELEASE

EMC Delivers “Cloud to Ground” Root-Cause Analysis for Data
Centres

Newest Ionix Server Manager Uniquely Integrates Physical and Virtual
Infrastructure Management, Enabling Rapid Resolution and Service
Assurance in Cloud Deployments

News Summary:
* The latest version of Ionix Server Manager delivers complete
virtualization visibility by adding discovery and monitoring of the
VMware® vSwitch. This new capability allows EMC to uniquely integrate
physical and virtual management, which solves a critical IT challenge by
eliminating management “blind spots.”
* Through integration with VMware vCenter and a full understanding of
the vSwitch, Server Manager automatically identifies virtual machines
(VMs) whose mis-configured virtual network settings have effectively
made these VMs – and the applications running on them – unavailable.

* With this new integration and understanding, EMC’s cross
correlation and analysis now spans VMs, vSwitches and virtual networks,
VMware ESX Servers, the physical network, and the rest of the IT
Infrastructure. The seamless, unified view of IT relationships that is
provided – spanning from virtual to physical – allows customers to
gain extensive insight and awareness into their virtualized data
centres.
* The addition of vSwitch discovery and monitoring uniquely extends the
scope of the EMC Ionix IT Operations Intelligence management suite to
help IT managers rapidly resolve problems and assure IT service
delivery, even as virtualization and cloud computing introduce their own
new management challenges.

Full Story:

EMCWORLD 2011 – LAS VEGAS – May 10, 2011 – EMC Corporation (NYSE:
EMC) today announced the availability of the newest version of its EMC®
IonixTM Server Manager software. Through rapid “Cloud to Ground”
discovery and analysis capabilities – newly enabled by integration
with vCenter and a full understanding of VMware’s vSwitch – EMC
Ionix Server Manager 3.0 enhances users’ ability to effectively manage
and troubleshoot virtualized data centre networks and infrastructure. By
extending automated discovery, root-cause analysis and business-impact
analysis through the virtual network, and down to the VM level, users
can immediately and accurately pinpoint and address issues in complex IT
infrastructures– whether in the physical or virtual environment, or
both.

As organizations expand server virtualization to include
mission-critical applications, ongoing VM creation, movement and use of
virtual networking introduces new challenges for data centre managers
when they need to isolate and resolve infrastructure issues. Similarly,
cloud infrastructures, by nature, are fluid and dynamic, requiring
management and analysis tools that are geared for rapidly changing
infrastructure. In virtualized data centre environments, the links
between physical and virtual infrastructure elements can also be a
potential problem source. Until now, however, mutually distinct tools
for the analysis of physical and virtual infrastructure were required.
This disparate and inefficient approach to problem resolution and
management unnecessarily places limits on an IT organization. EMC Ionix
Server Manager 3.0 changes all this by allowing a holistic approach to
virtualized data centre management.

Additional Product Highlights

EMC Ionix Server Manager 3.0:
* Discovers and monitors VMware vSwitches on ESX® servers
* Monitors the health of server clusters (another form of server
virtualization), including Microsoft Cluster Services (MSCS), Symantec
Veritas Cluster Server (VCS) and BigIP F5 LoadBalancer servers
* Supports Microsoft
Hyper-V, in addition to VMware ESX
* Determines when key processes are unavailable
* Identifies when servers are operating in a degraded state (through
integration with IBM, HP, Dell and Oracle server hardware monitoring)
* Server Manager requires concurrent use of Ionix Service Assurance
Manager and Ionix IP Availability Manager.

Customer Quote
CompuCom, the leading IT outsourcing specialist, incorporates
international standards, real world experience, and ITIL best practices
into the company’s service desk, managed desktop, managed security,
data centre, remote infrastructure management and hosted virtual desktop
services.

"When a network or infrastructure issue arises, identifying the source
of the issue is critical, and often the identification process takes as
much as or more time than the actual fix. Virtualization adds another
dimension to the discovery process, so having the ability to discover
and monitor at the virtual machine level is essential as we continue to
expand our virtual environment. CompuCom’s implementation of Ionix
Server 3.0 allowed us to consolidate and streamline the management of
our physical and virtual infrastructure."
–Michael Cruise, Managing Solution Director, CompuCom

Industry Analyst Quote
“Virtualization management is clearly a growing area of focus for IT
managers – and for good reason. The inability of an enterprise manager
to be able to efficiently pinpoint and resolve infrastructure issues at
the virtual machine level is a potential stumbling block in the process
of deploying virtualization and cloud technologies. EMC’s Ionix Server
Manager 3.0 clears the way for effective problem resolution in these
environments, and delivers an elegant and efficient solution to the
management challenges that inevitably face IT managers as they enable
virtual and cloud-based infrastructures.”
–Jim Frey, Managing Research Director, Network Management, Enterprise
Management Associates

EMC Executive Quote
“The industry’s adoption of VMware ESX virtualization continues at
a torrid rate, yet the availability of management solutions that can
address the entire range of the resulting infrastructure has not kept
pace. Only EMC can offer a fully integrated and automated solution for
identifying the root cause and business impact of problems across
virtual and physical environments. The addition of Ionix Server Manager
3.0 extends the value of the EMC Ionix IT Operations Intelligence
solution suite, differentiates it with capabilities that competitors
simply can’t deliver, and helps enable customers to make their journey
to the cloud.”
–Jay Mastaj, Senior Vice President and General Manager, EMC Ionix

Please visit www.emc.com for more information on Ionix Server Manager
3.0 (http://www.emc.com/products/detail/software/server-manager.htm) and
other Ionix IT Operations Intelligence
(http://www.emc.com/products/category/subcategory/it-operations-intelligence.htm)
infrastructure management solutions.

Availability
EMC Server Manager 3.0 is generally available from EMC and through
Ionix Direct Resellers.

To track the latest EMC World 2011 happenings visit
www.emc.com/emcworld2011.

About EMC

EMC Corporation (NYSE: EMC) is the world’s leading developer and
provider of information infrastructure technology and solutions that
enable organizations of all sizes to transform the way they compete and
create value from their information. Information about EMC’s products
and services can be found at www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Michelle Chang/Mike Martin
StrategicAmpersand
416-961-5595
michelle@stratamp.com
mike@stratamp.com


EMC and Ionix are registered trademarks or trademarks of EMC
Corporation in the United States and other countries.VMware and ESX are
registered trademarks and/or trademarks of VMware, Inc. in the Unit
ed
States and/or other jurisdictions. All other trademarks used herein are
the property of their respective owners.

This release contains "forward-looking statements" as defined under the
Federal Securities Laws. Actual results could differ materially from
those projected in the forward-looking statements as a result of certain
risk factors, including but not limited to: (i) adverse changes in
general economic or market conditions; (ii) delays or reductions in
information technology spending; (iii) the relative and varying rates of
product price and component cost declines and the volume and mixture of
product and services revenues; (iv) competitive factors, including but
not limited to pricing pressures and new product introductions; (v)
component and product quality and availability; (vi) fluctuations in
VMware, Inc.'s operating results and risks associated with trading of
VMware stock; (vii) the transition to new products, the uncertainty of
customer acceptance of new product offerings and rapid technological and
market change; (viii) risks associated with managing the growth of our
business, including risks associated with acquisitions and investments
and the challenges and costs of integration, restructuring and achieving
anticipated synergies; (ix) the ability to attract and retain highly
qualified employees; (x) insufficient, excess or obsolete inventory;
(xi) fluctuating currency exchange rates; (xii) threats and other
disruptions to our secure data centres or networks; (xiii) our ability
to protect our proprietary technology; (xiv) war or acts of terrorism;
and (xv) other one-time events and other important factors disclosed
previously and from time to time in EMC's filings with the U.S.
Securities and Exchange Commission. EMC disclaims any obligation to
update any such forward-looking statements after the date of this
release.


If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.

********************
FOR IMMEDIATE RELEASE

EMC and Box Deliver Enterprise Content Management Mobility through the
Cloud

Combined Enterprise Offering Provides Secure Content Access and
Collaboration from Anywhere, on Any Device

News Summary:

* EMC is working with Box to deliver integrated content management in
the cloud.
* Customers benefit from Box’s intuitive user interface, easy
external collaboration and content access from any mobile device –
combined with the enterprise-class security, compliance and process
management synonymous with EMC® Documentum®.

Full Story:

EMCWORLD 2011 – LAS VEGAS – May 10, 2011 – EMC Corporation (NYSE:
EMC) today announced a technology collaboration with Box to develop
integrated content management solutions, bringing the benefits of
cloud-enabled sharing and collaboration to global enterprises. Customers
will benefit from Box’s intuitive user interface, easy external
collaboration and content access from any mobile device, paired with the
enterprise-class security, compliance and process management synonymous
with EMC® Documentum®. The two companies will preview their solutions as
part of Momentum at EMC World in Las Vegas.

EMC Documentum customers can immediately connect their on-premise
deployments to Box through Box’s ECM Cloud Connect, making it easy to
synchronize, archive and transfer content between the two systems. The
companies are currently working to build even deeper integrations to
offer customers a truly seamless content management and collaboration
experience.

“EMC and Box are enabling our customers’ journey to the cloud –
taking the user experience for accessing, sharing and collaborating on
enterprise content to a new level,” said Rick Devenuti, President of
the Information Intelligence Group, a Division of EMC. “We’re
pleased to launch this next phase of Enterprise Content Management,
which squarely meets the demands of the new user in this Post PC era.

Secure Access, Anywhere, Any
 Device

The Post PC era gives birth to the “new user,” who interacts with
information from a variety of sources, across a multitude of devices,
and considers Microsoft applications as part of the experience, not the
driver. Integrating Box’s cloud layer and user-friendly interface with
EMC Documentum delivers the new mobile and external collaboration
capabilities required for businesses to make better, faster decisions.
These cloud-enabled joint solutions strike the right balance in giving
users easy-to-use tools for accessing information regardless of device,
with the control IT expects for capturing, managing, processing and
preserving content.

“We’re excited to work with EMC to accelerate cloud adoption in the
world’s largest enterprises by connecting their content management
infrastructure to the cloud,” said Aaron Levie, Co-Founder and CEO of
Box. “These solutions are at the forefront of a major transition in
enterprise IT, as vendors will increasingly need to work together to
create powerful, open solutions that bring customers the benefits of
cloud-enabled software without disrupting their existing systems and
processes.”

Follow EMC World Online

To track the latest EMC World 2011 happenings visit the EMC World
Newsroom at www.emc.com/emcworldnewsroom.

For continuous EMC World news and event updates, follow
http://twitter.com/emcworld and http://twitter.com/emccorp.

About EMC

EMC Corporation (NYSE: EMC) is the world’s leading developer and
provider of information infrastructure technology and solutions that
enable organizations of all sizes to transform the way they compete and
create value from their information. Information about EMC’s products
and services can be found at www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Michelle Chang/Mike Martin
StrategicAmpersand
416-961-5595
michelle@stratamp.com
mike@stratamp.com


EMC and Documentum are registered trademarks or trademarks of EMC
Corporation in the United States and other countries.All other
trademarks used herein are the property of their respective owners.

Forward-Looking Statement:
This release contains “forward-looking statements” as defined under
the Federal Securities Laws. Actual results could differ materially from
those projected in the forward-looking statements as a result of certain
risk factors, including but not limited to: (i) adverse changes in
general economic or market conditions; (ii) delays or reductions in
information technology spending; (iii) the relative and varying rates of
product price and component cost declines and the volume and mixture of
product and services revenues; (iv) competitive factors, including but
not limited to pricing pressures and new product introductions; (v)
component and product quality and availability; (vi) fluctuations in
VMware, Inc.’s operating results and risks associated with trading of
VMware stock; (vii) the transition to new products, the uncertainty of
customer acceptance of new product offerings and rapid technological and
market change; (viii) risks associated with managing the growth of our
business, including risks associated with acquisitions and investments
and the challenges and costs of integration, restructuring and achieving
anticipated synergies; (ix) the ability to attract and retain highly
qualified employees; (x) insufficient, excess or obsolete inventory;
(xi) fluctuating currency exchange rates; (xii) threats and other
disruptions to our secure data centres or networks; (xiii) our ability
to protect our proprietary technology; (xiv) war or acts of terrorism;
and (xv) other one-time events and other important factors disclosed
previously and from time to time in EMC’s filings with the U.S.
Securities and Exchange Commission. EMC disclaims any obligation to
update any such forward-looking statements after the date
 of this
release.


If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.