AT&T Survey: Businesses in Canada's Commercial Capital Place High Priority on Disaster Preparedness and Recovery

AT&T Survey: Businesses in Canada's Commercial Capital Place High Priority on Disaster Preparedness and Recovery

AT&T Business Continuity Study Reveals Local Businesses Are Prepared For Unexpected Disaster, Proactively Investing in Security

TORONTO, May 2, 2012 /PRNewswire via COMTEX/ -- As one of Canada's primary commercial centres, Toronto requires increasingly complex network infrastructure for its major industries, which include finance, telecommunications, education, and medical research. To ensure that these services continue uninterrupted, IT executives in the city must be prepared for diverse threats like extreme weather, 'virtual' events like security breaches and power outages - the effects of which still resonate with local businesses that lost power in the Northeast Blackout of 2003.

A recent AT&T* study indicates that a vast majority (85%) of Toronto-area companies have developed business continuity plans to help identify, prevent and respond to adverse conditions, a third of whom are saying it has become a priority in recent years due to natural disasters and security issues. The survey shows that this level of preparedness has extended beyond theoretical threats for a plurality (44%) of companies who have had to invoke their business continuity plans in the past year.

Despite a volatile economy, businesses continue to invest in new technologies. Six out of ten (59%) Toronto executives surveyed indicate that in 2012 their companies will make strategic investments in areas like mobile applications (37%), cloud computing (35%) and security solutions (27%). Cloud computing has become a particular focus - a majority (57%) of executives are either currently using cloud or considering using it as part of their business continuity strategy. When it comes to disaster recovery, executives would most frequently use cloud computing for data storage (40%) and Web servers (37%).

AT&T recognizes the risks associated with unexpected external threats and offers a wide array of business continuity services, encompassing disaster planning, risk management, recovery preparedness and communications readiness. In times of severe network damage that exceeds the capacity of local resources, AT&T deploys its Network Disaster Recovery (NDR) team that can rapidly recover vital networks services in an effort that would otherwise take weeks or months.

"Today's businesses are more connected than ever and it is essential that communities and leading organizations continue to prepare for and establish a response to these unexpected situations," said Kelly Morrison, Senior Technical Specialist, AT&T NDR. "AT&T responds to these threats to help restore vital telecommunications services for our business and government customers following a disaster."

For the first time since 1997, AT&T will be conducting a full-scale NDR simulation from May 4 through May 7 at Toronto's Canadian National Exhibition Grounds.

Held several times a year throughout North America, these NDR exercises simulate the loss of a network office due to disaster and are designed to test, refine and strengthen AT&T's business continuity and disaster recovery services in order to minimize network downtime.

Business Continuity Study Key Findings

AT&T's 2012 Business Continuity Study found that businesses in the Greater Toronto Area are preparing for potential disasters and investing in additional technology:

The vast majority (85%) of local companies surveyed already have a business continuity plan in place.

Six out of ten (60%) have tested their continuity plan in the last 12 months.

A plurality (44%) has invoked their business plan in the last 12 months.

More than two thirds (69%) suggest they implement specific protective actions when the federal or provincial government issues an alert for an impending disaster.

Eighty five per cent (85%) indicate the complexity of network infrastructure is increasing.

Nearly eight out of ten (79%) report their IT budgets will be higher in 2012 than in the previous two years.

A majority (52%) indicate cloud computing is currently part of their corporate infrastructure.

For more information on the 2012 AT&T Business Continuity Study, including complete research results visit http://www.att.com/businesscontinuity-news

Study methodology

The results are based on an online survey of 100 Information Technology (IT) executives in Toronto, Canada. The study was conducted by Research Now with companies having total revenues of more than $25 million (except for government entities). Surveys were obtained between March 15 and 23, 2012.

AT&T NDR Program

This week's NDR exercise at the Canadian National Exhibition Grounds in Toronto includes an extensive deployment of AT&T's network recovery equipment. The exercise tests and refines the team's speed and efficiency in restoring wireline and wireless network operations in the event of an actual disaster. Essential to AT&T's own comprehensive business continuity plan, the Toronto NDR exercise features the following disaster recovery equipment: a total of 24 pieces of disaster recovery equipment, including:

Three technology recovery trailers

A portable, satellite communications system used for first-in, emergency communications

A 53' incident command/team support trailer

This exercise marks AT&T's second exercise in the Greater Toronto Area; the last local exercise was held in 1997.

AT&T has invested more than $600 million in its NDR program, which includes specially trained managers, engineers and technicians, as well as a fleet of more than 320 self-contained equipment trailers and support vehicles that house the same equipment and components as an AT&T data-routing or voice-switching center.

More information on AT&T's NDR program is available at AT&T Network Disaster Recovery.

*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.

About AT&T

AT&T Inc. T -0.09% is a premier communications holding company and one of the most honored companies in the world. Its subsidiaries and affiliates - AT&T operating companies - are the providers of AT&T services in the United States and around the world. With a powerful array of network resources that includes the nation's fastest mobile broadband network, AT&T is a leading provider of wireless, Wi-Fi, high speed Internet, voice and cloud-based services. A leader in mobile broadband and emerging 4G capabilities, AT&T also offers the best wireless coverage worldwide of any U.S. carrier, offering the most wireless phones that work in the most countries. It also offers advanced TV services under the AT&T U-verse® and AT&T â"eDIRECTV brands. The company's suite of IP-based business communications services is one of the most advanced in the world. In domestic markets, AT&T Advertising Solutions and AT&T Interactive are known for their leadership in local search and advertising.

Additional information about AT&T Inc. and the products and services provided by AT&T subsidiaries and affiliates is available at http://www.att.com . This AT&T news release and other announcements are available at http://www.att.com/newsroom and as part of an RSS feed at www.att.com/rss . Or follow our news on Twitter at @ATT.

© 2012 AT&T Intellectual Property. All rights reserved. Mobile broadband not available in all areas. AT&T, the AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.

SOURCE AT&T Inc.

Mobile Adult Subscription Revenues to Reach Almost $1 billion by 2015

 

Mobile Adult Subscription Revenues to Reach Almost $1 billion by 2015

Growth in Smartphone and Tablet Users to drive Increase

Hampshire, UK – 2nd May 2012: A new report from Juniper Research finds that the revenues from mobile adult subscriptions will reach nearly $1 billion by 2015. This growth will be fuelled by rises in the smartphone and tablet user bases alongside an increase in the average spend per user despite increasing competition from free content.

The Rise of the Tablet Subscriber

A dramatic rise in the tablet user base will also drive the increase in subscription revenues; particularly as the majority of tablets will be in the very regions which have historically spent the most on adult subscriptions. Tablets offer users a more engaging experience as they are able to see content in more detail as well as see more options when browsing. Niche tastes will also continue to drive users towards subscription accounts.

Barriers to Growth

While revenues will grow significantly, the report also found that in emerging markets growth will be restricted by low smartphone take up and a lack of viable payment methods, such as credit card usage. In many cases, legal and social barriers will also inhibit the growth of mobile adult subscription revenues in these markets.

According to report author Charlotte Miller, ‘Mobile adult subscriptions will be a growing source of mobile adult revenues. Niche content has always been a driver of paid adult content and this is no less true on mobile. While there has been a proliferation of free content, it remains that case that for specialised content, users must continue to pay.’

Other key findings from the report include:

  • North America and Western Europe with account for over 70% of total end-user mobile adult revenues.
  • Adult Videochat users to more than triple by 2015 accounting for over half of mobile adult content revenues by 2015.

The Mobilising Adult Revenues whitepaper is available to download from the Juniper website together with further details of the full study, Mobile Adult Content: Trends, Drivers and Business Models 2012 – 2017.

Juniper Research provides research and analytical services to the global hi-tech communications sector, providing consultancy, analyst reports and industry commentary.

For further details please contact Mosh Rahman, Press Relations
T: +44(0)1256 830 001
E: mosh.rahman@juniperresearch.com

VMware Advances VMware View and End-User Computing Solutions for the Post-PC Era

VMware Advances VMware View™ and End-User Computing Solutions for the Post-PC Era

Launch of Horizon Application Manager™ 1.5 and VMware Project Octopus Beta Provides an Easy and Secure Way for Employees to Access Applications, Share Data and Collaborate from Any Device

PALO ALTO, Calif., May 2, 2012 — VMware, Inc. (NYSE: VMW), the global leader in virtualization and cloud infrastructure, today unveiled VMware View™ 5.1 and an updated portfolio of end-user computing solutions designed to empower a more agile, productive and connected enterprise.

“Customers are looking for solutions that break down current technology barriers and shift the focus to delivering services that can be accessed anywhere, on any device,” said Boaz Chalamish, senior vice president and general manager, End-User Computing, VMware. “VMware View™ 5.1 and our growing portfolio of personal cloud solutions will address the needs to simplify technology, manage more efficiently and better connect employees.”

The VMware end-user computing portfolio seeks to free employees and IT organizations from more than two decades of complex, device-centric computing, and delivers a more user-centric experience for the connected enterprise. In this new model, organizations leverage hybrid cloud resources – while maintaining a managed, secure environment – to provide new ways for employees to collaborate across applications and data from any device, where and when a user needs it.

Your Personal Cloud: Enabling a New Way to Work
All built upon the foundation of VMware vSphere®, VMware is bringing to market a comprehensive portfolio of technologies that will help IT organizations empower a more agile, productive and connected enterprise:

  • Reduced TCO – New storage capabilities in VMware View 5.1 enabled by VMware View Storage Accelerator will reduce shared storage costs by optimizing shared storage loads. A Tech Preview* of VMware View Composer Array Integration (VCAI) will leverage the native cloning abilities in the storage array to offload storage operations to improve provisioning speeds. In addition, VMware View Persona Management will extend to physical desktops, preserving user settings across all Windows devices and streamlining the migration from physical to stateless virtual desktops.
  • Simplified Management and Increased IT Control – Enhancements to VMware View 5.1 will enable IT organizations to streamline key IT processes such as provisioning, configuration management, connection brokering, policy enforcement, performance monitoring, and application assignment from a single management console. VMware View also enables IT organizations to increase security and compliance by moving data into the datacentre, centrally enforcing endpoint security and policy configuration and streamlining antivirus processes.
  • Industry’s Best Virtual Desktop Experience – VMware View 5.1 features a new USB stack that will improve device support, while integration of RADIUS two-factor authentication will provide users and organizations greater security choices. VMware View with PCoIP® adapts to the end user’s network connection to provide a high-quality, customized desktop experience over the LAN and WAN. Users can connect to their VMware View desktop from a variety of mobile and fixed endpoints with updated clients for Mac, Windows and Linux desktops, thin or zero clients, and Apple iPad, Android and Amazon Kindle Fire tablets.

Additional information can be found in the VMware View 5.1 media backgrounder.

  • VMware vCenter™ Operations for VMware View: Cloud Infrastructure Insight – To be offered as a new add-on to VMware View, VMware vCenter Operations for VMware View will enable administrators to have broad insight into desktop performance, quickly pinpoint and troubleshoot issues, optimize resource utilization, and proactively address potential issues in real time.
  • VMware Horizon Application Manager™: Your Personal Cloud Broker – To be offered as an on-premise virtual appliance, VMware Horizon Application Manager™ 1.5 is a centralized policy and entitlement engine that will broker user access to applications, virtual desktops and data resources. Integrating the application virtualization capabilities of VMware ThinApp®, the VMware Horizon Application Catalogue will benefit both IT and end users by consolidating diverse application types into a single, unified catalog. In addition, the VMware Horizon Workspace delivers a simple, seamless end-user experience when accessing work resources across private and public clouds on whatever device a user chooses. Additional information can be found in the VMware Horizon Application Manager media backgrounder.
  • VMware Project Octopus: Your Personal Data Cloud – Available later this quarter as a beta for qualified customer trials, VMware Project Octopus will enable IT organizations to provide employees with an easy and secure way to share data and collaborate with anyone from any device. Deployed on-premise or accessed via a VMware service provider, VMware Project Octopus will provide the ability for IT administrators to govern usage and set policies for data access and sharing within their organization or with external contributors. Additional information can be found in the VMware Project Octopus media backgrounder.
  • VMware Personal Cloud Applications: Share More, Send Less – Composed of VMware Zimbra® and VMware Socialcast®, VMware cloud applications connect employees to the knowledge, ideas, and resources they need to work smarter. As part of today’s announcement, VMware Zimbra 7.2 will support Secure/Multipurpose Internet Mail Extensions (S/MIME) for government deployments requiring encryption.
Empowered IT, Delighted End Users
With approximately 2,100 employees, Foley & Lardner LLP is a global law firm that provides business and legal insight to clients. Looking to support its highly mobile workforce of lawyers and support staff, the company implemented VMware View as part of its Bring Your Own Device (BYOD) program. VMware View enables the employees of Foley and Lardner to access their virtual desktops and critical applications from their mobile device of choice, including iPads and laptops.

“VMware View™ is a key component of our Bring Your Own Device (BYOD) program with more than 1,200 virtual desktops in production today and we expect to have 2,000 deployed by the end of the year,” said Linda D. Sanders, chief information officer, Foley and Lardner LLP. “Today, our lawyers and staff can access their virtual desktops at the office on thin clients, in the courtroom on their iPads or anywhere on their personal PCs. As we look beyond desktops, we see an opportunity to offer our employees a secure way to access their applications, share data and collaborate from any device based on the VMware end-user computing portfolio.”

Charting the End-User Journey: Professional Services
Helping customers chart their journey to a new model requires a plan. VMware Professional Services offers on-site, end-to-end consulting services to help customers who are interested in beginning the journey to a user-centric application and data delivery model as well as those who are well on the path. Visit VMware Professional Services for more information.

Availability
VMware View 5.1 together with the updated VMware end-user computing portfolio is expected to be available in Q2 2012.

Additional Resources:


VMware End-User Computing Blog Posts:


About VMware:
VMware is the leader in virtualization and cloud infrastructure solutions that enable businesses to thrive in the Cloud Era. Customers rely on VMware to help them transform the way they build, deliver and consume Information Technology resources in a manner that is evolutionary and based on their specific needs. With 2011 revenues of US$3.77 billion, VMware has more than 350,000 customers and 50,000 partners. The company is headquartered in Silicon Valley with offices throughout the world and can be found online at www.vmware.com. VMware Canada is headquartered in Burlington, Ontario, and can be found online at www.vmware.ca.

-30-

For more information please contact:

Cindy Watson / Claire McCorquodale

StrategicAmpersand Inc.

cindy@stratamp.com / claire@stratamp.com

(416) 961-5595

VMware, VMware Horizon, VMware Horizon Application Manager, VMware ThinApp, VMware vCenter, VMware View, VMware vSphere, and VMware Zimbra are registered trademarks and/or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. The use of the word “partner” or “partnership” does not imply a legal partnership relationship between VMware and any other company.

Forward-Looking Statements
This press release contains forward-looking statements including, among other things, statements regarding the expected availability of VMware View 5.1, Project Octopus and VMware vCenter™ Operations for VMware View and their prospective benefits for customers and expectations regarding the evolution of corporate and enterprise IT. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to (i) our ability to integrate iTHC capabilities into our benchmarking services; (ii) adverse changes in general economic or market conditions; (iii) priorities, delays or reductions in information technology spending; (iv) competitive factors, including but not limited to pricing pressures, industry consolidation, entry of new competitors into the virtualization and cloud computing markets, and new product and marketing initiatives by our competitors; (v) our customers’ ability to develop, and to transition to, new products and computing strategies such as cloud computing and desktop virtualization; (vi) the uncertainty of customer acceptance of emerging technology; (vii) rapid technological and market changes in virtualization software and platforms for cloud and desktop computing; (viii) changes to product development timelines; (ix) VMware’s ability to protect its proprietary technology; and (x) VMware’s ability to attract and retain highly qualified employees.. These forward looking statements are based on current expectations and are subject to uncertainties and changes in condition, significance, value and effect as well as other risks detailed in documents filed with the Securities and Exchange Commission, including our most recent reports on Form 10-K and Form 10-Q and current reports on Form 8-K that we may file from time to time, which could cause actual results to vary from expectations. VMware assumes no obligation to, and does not currently intend to, update any such forward-looking statements after the date of this release.

*Tech Preview indicates a non-supported feature/technology not yet validated for use in production environments

 

IBM Study Reveals Critical Shift in the Role of Chief Information Security Executives Globally

IBM Study Reveals Critical Shift in the Role of Chief Information Security Executives Globally

 

Analysis of 130+ interviews presents a new class of security chiefs;

CISO role follows the evolution of CIO and CFO with more strategic organizational responsibilities

 

ARMONK, N.Y. - 3 May 2012: A new IBM (NYSE: IBM) study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus to strategic business leadership role.  

In IBM’s first study of senior security executives, its Center for Applied Insights interviewed more than 130 security leaders globally and discovered three types of leaders based on breach preparedness and overall security maturity. Representing about a quarter of those interviewed, the “Influencer” senior security executives typically influenced business strategies of their firms and were more confident and prepared than their peers—the “Protectors” and “Responders.” 

 

Overall, all security leaders today are under intense pressure, charged with protecting some of their firm’s most valuable assets – money, customer data, intellectual property and brand.  Nearly two-thirds of Chief Information Security Executives (CISOs) surveyed say their senior executives are paying more attention to security today than they were two years ago, with a series of high-profile hacking and data breaches convincing them of the key role that security has to play in the modern enterprise. More than half of respondents cited mobile security as a primary technology concern over the next two years.  Nearly two-thirds of respondents expect information security spend to increase over the next two years and of those, 87 percent expect double-digit increases.

 

Rather than just reactively responding to security incidents, the CISO’s role is shifting more towards intelligent and holistic risk management– from fire-fighting to anticipating and mitigating fires before they start.  Several characteristics emerged as notable features among the mature security practices of “Influencers” in a variety of organizations:

 

  • Security seen as a business (versus technology) imperative: One of the chief attributes of a leading organization is having the attention of business leaders and their boards. Security is not an ad hoc topic, but rather a regular part of business discussions and, increasingly, the culture. In fact, 60 percent of the advanced organizations named security as a regular boardroom topic, compared to only 22 percent of the least advanced organizations.  These leaders understand the need for more pervasive risk awareness – and are far more focused on enterprise-wide education, collaboration and communications.  Forward-thinking security organizations are more likely to establish a security steering committee to encourage systemic approaches to security issues that span legal, business operations, finance, and human resources. Sixty-eight percent of advanced organizations had a risk committee, versus only 26 percent in the least advanced group.

 

  • Use of data-driven decision making and measurement: Leading organizations are twice as likely to use metrics to monitor progress, the assessment showed (59 percent v. 26 percent). Tracking user awareness, employee education, the ability to deal with future threats, and the integration of new technologies can help create a risk-aware culture. And automated monitoring of standardized metrics allows CISOs to dedicate more time to focusing on broader, more systemic risks.

 

  • Shared budgetary responsibility with the C-suite: The assessment showed that within most organizations, CIOs typically have control over the information security budget. However, among highly ranked organizations, investment authority lies with business leaders more often. In the most advanced organizations, CEOs were just as likely as CIOs to be steering information security budgets. Lower ranking organizations often lacked a dedicated budget line item altogether, indicating a more tactical, fragmented approach to security.  Seventy-one percent of advanced organizations had a dedicated security budget line item compared to 27 percent of the least mature group.

 

“This data painted a profile of a new class of CISO leaders who are developing a strategic voice, and paving the way to a more proactive and integrated stance on information security,” said David Jarvis, author of the report and senior consultant at the IBM Center for Applied Insights. “We see the path of the CISO is now maturing in a similar pattern to the CFO from the 1970s, the CIO from the 1980s – from a technical one to a strategic business enabler. This demonstrates how integral IT security has become to organizations.”

 

Recommendations to Evolve the Security Role in an Enterprise

To create a more confident and capable security organization, IBM recognizes that security leaders must construct an action plan based on their current capabilities and most pressing needs. The report offers prescriptive advice from its findings on how organizations can move forward based on their current maturity level.

For example, those “Responders” in the earliest stage of security maturity can move beyond their tactical focus by establishing a dedicated security leadership role (like a CISO); assembling a security and risk committee measuring progress; and automating routine security processes to devote more time and resources to security innovation.

“Security in a hyper-connected era presents a new set of challenges, but these can be greatly eased by implementing innovative practices and adopting a more integrated, holistic approach,” said Marc van Zadelhoff, an author of the report and vice president of Strategy, IBM Security Systems. “CISOs that prioritize these factors can help their organizations significantly improve business processes and achieve measurable success in their progress toward building a risk-aware culture that is agile and well-equipped to deal with future threats.”

 

About the Assessment

The IBM Center for Applied Insights study, “Finding a strategic voice: Insights from the 2012 IBM Chief Information Security Officer Assessment,” included organizations spanning a broad range of industries and seven countries. During the first quarter of 2012, the Center conducted double-blind interviews with 138 senior business and IT executives responsible for information security in their enterprises. Nearly 20 percent of the respondents lead information security in enterprises with more than 10,000 employees; 55 percent are in enterprises with 1,000 to 9,999 employees.

To access the full study, visit ibm.com/smarter/cai/security

 

About IBM Security

IBM's security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, network security and more. IBM operates the world's broadest security research and development organization and delivery organization. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents.

For more information on IBM security, please visit: www.ibm.com/security.

 

 

Sherry Boisvert
Senior Account Supervisor

+1 416 355 7418

Ketchum

break through

 

PRWeek Agency of the Year and International Consultancy of the Year

PR News Top Places to Work in PR


A proud partner of Room to Read. World Change Starts with Educated Children®

 

 

----------------------------
This message is intended only for the person or entity to which it is addressed and may contain information that is privileged, confidential or otherwise protected from disclosure. Dissemination, distribution or copying of this message or the information herein by anyone other than the intended recipient, or an employee or agent responsible for delivering the message to the intended recipient, is prohibited. If you have received this message by mistake, please destroy it immediately and notify the sender.
----------------------------

TELUS to provide Sun Life with national eClaims solution for extended healthcare providers

TELUS to provide Sun Life with national eClaims solution for extended healthcare providers

New paperless choice enables physiotherapists, chiropractors and visioncare providers to electronically submit claims directly to Sun Life on behalf of their clients

TORONTO, May 1, 2012 /CNW/ -TELUS Health Solutions has announced that Sun Life Assurance Company of Canada has signed an agreement with TELUS to offer benefit plan members an easy way to submit their claims electronically, right from the offices of their healthcare providers.

This electronic choice for physiotherapists, chiropractors and visioncare providers will result in plan members receiving their benefits payments faster, thus enhancing client satisfaction. Clients will also benefit from Sun Life's powerful anti-fraud technology that tracks unusual claiming patterns, thereby helping to decrease the risk of loss from fraud for plan sponsors.

"As a market leader in group benefits in Canada, we are constantly looking for innovative ways to feed into the growing popularity of convenient paperless options with our clients.  This latest innovation that we're offering with TELUS will enable providers on behalf of plan members to submit a claim before they leave their healthcare provider's office," said Stuart Monteith, senior vice-president, Group Benefits, Sun Life Financial Canada.

"We are delighted to welcome Sun Life to our expanding group of insurance companies using the TELUS Health e-Claims solution, which will allow them to proactively, conveniently and efficiently support employers and plan members in their efforts to manage health," said Paul Lepage, senior vice president, TELUS Health Solutions. "By working together with our insurance customers to create new ways to enhance their clients' experience, we can help achieve value for all Canadians now and in the future."

Providers will be able to use their own management system or a portal on a website managed by TELUS to submit eClaims. The system makes it easy for healthcare providers to submit eClaims quickly so that they can:

  • Spend more time taking care of their clients
  • Minimize plan members' out-of-pocket payment amounts with reimbursement assigned to providers
  • Better manage their billing and receivables activities
  • Decrease the paperwork involved in manual preparation and submission of receipts or insurance forms, and
  • Reduce their claims processing time and costs.

TELUS is a leader in Canada's claims and benefits management sector, providing drug claims processing for over 10 million Canadians.  TELUS Health eClaims, launched in 2010, has experienced rapid adoption by the extended healthcare community with over 10,000 providers now on board.

About Sun Life Financial

Sun Life Financial is a leading international financial services organization providing a diverse range of protection and wealth accumulation products and services to individuals and corporate customers. Chartered in 1865, Sun Life Financial and its partners today have operations in key markets worldwide, including Canada, the United States, the United Kingdom, Ireland, Hong Kong, the Philippines, Japan, Indonesia, India, China and Bermuda. As of December 31, 2011, the Sun Life Financial group of companies had total assets under management of $466 billion. For more information, please visit www.sunlife.com.

Sun Life Financial Inc. trades on the Toronto (TSX), New York (NYSE) and Philippine (PSE) stock exchanges under the ticker symbol SLF.

Note to Editors: All figures in Canadian dollars.

Sun Life Assurance Company of Canada is a wholly-owned subsidiary of Sun Life Financial Inc. and a member of the Sun Life Financial group of companies.

About TELUS Health Solutions

TELUS Health Solutions is a leader in telehealth, electronic health records, remote patient monitoring, mobile home and community care, consumer health, benefits management and pharmacy management. Our solutions give health authorities, providers, physicians, patients and consumers the power to enhance decision making and improve outcomes for Canadians. TELUS Health Solutions is Canada's leading Healthcare IT Company as cited by the Branham Group for five years and has been honoured as the ITAC Health Company of the Year (2008) and Health Transformation Company of the Year (2009). For more information about TELUS Health Solutions, please visit www.telushealth.com.

For further information:

Janice Murray
TELUS Health Solutions
416-487-5007
Janice.murray@telus.com

Paul Moser
Sun Life Financial
519-888-3900 ext. 4041
paul.moser@sunlife.com

Dell Unveils High Performance XPS and Vostro Solutions

 

 

Dell Unveils High Performance XPS and Vostro Solutions for Families, Multimedia Professionals and Business

 

·         Dell’s latest XPS and Vostro desktops available with Intel 3rd generation quad core processors and powerful discrete graphics

 

 

TORONTO, May 2, 2012 – Dell continues to deliver high-performance laptops and desktops for families, multimedia professionals and businesses demanding power and performance for complex tasks and immersive entertainment activities. The XPS 8500  and Vostro 470 desktops are now available with Intel’s 3rd generation quad-core processors and the latest discrete graphics on Dell.ca for professionals who demand high-performance technology.

 

The XPS 8500 Desktop: Advanced Performance for Creatives

The XPS 8500 desktop delivers a superb user experience for creatives who demand uncompromising performance, whether composing music, working on graphics-intensive design, creating and editing various multimedia, or playing games. The desktop features a premium fit and finish in a compact chassis without sacrificing future expandability.

 

The desktop features 3rd generation Intel Core i5 and i7 quad-core processor options, powerful performance graphics options from NVIDIA and AMD, USB 3.0 for fast data transfer, mSATA solid-state drive options for fast application load and boot-up times, and large storage and memory capacity with options up to 3TB 7200RPM hard drives[i] and options up to 16GB 1600MHz memory[ii].

 

The Vostro 470 Desktop: Power for Business

The Vostro 470 mini-tower desktop delivers the power businesses demand with the price they can afford. The Vostro 470 offers affordable style and performance that goes beyond basic computing to tackle intensive processor tasks like financial modeling, data mining, video editing, web development and graphic design[iii].

 

The desktop delivers commanding performance with up to 3rd-generation Intel Core i5 and i7 quad-core processors with Intel Smart Response Technology[iv] for fast access to applications, discrete graphics options, USB 3.0 for fast data transfer, up to 2TB of storagei and 12GB of memory capacityii. Easy expandability options allow the Vostro 470 to grow with a business. Critical security and support service options like Dell ProSupport and DataSafe Online Backup offer businesses peace of mind to concentrate on their business, not their IT.

 

“Creatives and businesses can now choose Dell desktops available with Intel’s 3rd generation quad-core processors, delivering the performance they crave to pursue their professional passions,” said Sam Burd, vice president and general manager of product development for Dell.

 

Rapidly Expanding High-Performance Portfolio

The XPS 8500 and Vostro 470 desktops add to Dell’s growing portfolio of performance systems designed for the most-demanding customer requirements. Dell recently unveiled an enhanced portfolio of Alienware laptops, including the M14x, M17x and M18x laptops, each of which offer the latest Intel 3rd-generation quad core processors. Additionally, the popular Alienware X51 small form factor desktop will soon feature an Intel 3rd generation Core i7 processor option and high-speed 1600MHz memory. The enhanced Alienware laptop portfolio is designed to give gamers the ability to choose the system that best fits their gaming lifestyle.

 

Pricing and Availability:

The XPS 8500 (starting at $749 CDN) and Vostro 470 (starting at $549 CDN) desktops are available now on Dell.ca

 

Detailed Information:

XPS 8500

·         3rd Generation Intel Quad Core i5 and  i7 processor options

o    Intel Quad Core i5 3450

o    Intel Quad Core i7 3770

·         Powerful AMD Radeon and NVIDIA GeForce graphics options:

o    NVIDIA GeForce GT 620 1GB

o    AMD Radeon HD 7570 1 GB

o    NVIDIA GeForce GT640 1GB

o    AMD Radeon HD 7770 2GB

o    AMD Radeon HD 7870 2GB

·         Configure with up to 16GB of DDR3 memory (8GB standard)ii; 4 DIMM Slots

·         Configure with up to 3TB 3.5" 7200RPM HDD (1TB standard)i; optional HDD + mSATA SSD configurations up to 3TB + 256GB mSATA SSDi

·         DVD drive with optional Blu-Ray Combo drive for advanced entertainment

·         Microsoft Windows 7 Home Premium, Professional and Ultimate options

·         Integrated 10/100/1000 Gigabit Ethernet LAN

·         Bluetooth 4.0 with Wi-Fi card; optional WLAN combo card (802.11n + BT 4.0)

·         Integrated 7.1 Surround Sound

·         (4) USB 3.0 + (6) USB 2.0 PowerShare; RJ45 Ethernet, HDMI, VGA, Headphone jack, Microphone jack, 19-in-1 media card reader

·         Black and White colour options with Chrome trim

Vostro 470

·         3rd Generation Intel Core i5 and i7 processor options

·         Powerful AMD Radeon and NVIDIA GeForce graphics options (integrated graphics standard)

o    NVIDIA GeForce GT 620ii

o    1GB AMD Radeon HD 7570 DDR5ii

·         Configure with up to 8GB of DDR3 memoryii; 4 DIMM Slots

·         Support for 3 storage drives with configurations up to 2TB 3.5" 7200RPM HDDi; optional SSD configurations available

·         DVDRW drive

·         Microsoft Windows 7 Home Basic and Windows 7 Professional

·         Integrated 10/100/1000 Gigabit Ethernet LAN

·          (4) USB 3.0 + (6) USB 2.0 PowerShare; RJ45 Ethernet, HDMI, VGA, Headphone jack, Microphone jack, 19-in-1 media card reader

·         350W power supply

Key Links:

XPS 8500 Product Video

Vostro 470 Product Video

 

About Dell

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.ca.

 

Dell, Inspiron, Vostro, XPS and Alienware are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

 

Media and Analyst Contacts:

Janet Fabri

Dell

+1 (416) 758-3398

Janet_fabri@dell.com

Melissa Lee

Cohn & Wolfe

+1 (416) 924-5700

Melissa.lee@cohnwolfe.ca

 

 




[i] Hard Drive: GB means 1 billion bytes and TB equals 1 trillion bytes; actual capacity varies with preloaded material and operating environment and will be less.

[ii] Graphics & System Memory: GB means 1 billion bytes and TB equals 1 trillion bytes; significant system memory may be used to support graphics, depending on system memory size and other factors.

[iii] Additional software required and sold separately.

[iv] Intel Smart Response Technology-requires a properly configured hard drive (HDD + small SSD).  Offer may vary by region.

 

Canada Health Infoway Standards Collaborative launches new membership model with flexible options and lower fees



Canada Health Infoway Standards Collaborative launches new membership model with flexible options and lower fees


New two-tier model open to everyone interested in advancing Canadian health information standards

TORONTO, May 1, 2012 /CNW/ - Membership of Canada Health Infoway's (Infoway) Standards Collaborative is more affordable and now provides a broader range of benefits, announced Richard Alvarez, Infoway's President and CEO.

"We have amended Infoway's Standards Collaborative membership structure to help make international and pan-Canadian standards easier to understand and adopt," said Richard Alvarez, President and CEO, Canada Health Infoway. "Standards are crucial to informing the design of interoperable health information systems, providing common messaging and terminology."

The new Infoway Standards Collaborative membership model offers two-options:

  • General Membership: Available exclusively to individuals and students at no cost
  • Premium Membership: Available to students, individuals and corporations with a price range of $20 to $500

Both memberships provide access to review domestic and international SNOMED CT and HL7 standards, the ability to run for leadership positions, a variety of standards-related resources, and regular updates on standards activities in Canada and around the world.

Premium membership also includes usage rights of licenced standards which is required for implementation and creation of extensions and derivatives such as mapping terminologies.   Premium members will also be granted voting rights on standards content and leadership elections, discounts on Infoway conferences and education, and access to key implementation tools such as Apelon TermWorks and Infoway Remixer.

Membership of the Standards Collaborative for 2012-2013 expires on March 31, 2013.

Learn more about member benefits by tier, fee structures and how to register.

About the Infoway Standards Collaborative

The Infoway Standards Collaborative is a key resource for health information standards in Canada, establishing pan-Canadian standards that build the foundation for interoperability, providing services to support and maintain these standards, and acting in a formal liaison role to international Standards Development Organizations.

About Canada Health Infoway

Canada Health Infoway is an independent, not-for-profit organization funded by the federal government. Infoway jointly invests with every province and territory to accelerate the development and adoption of information and communications technology projects in Canada. Fully respecting patient confidentiality, these secure systems will provide clinicians and patients with the information they need to better support safe care decisions and manage their own health. Accessing this vital information quickly will help foster a more modern and sustainable health care system for all Canadians.

For further information:

Dan Strasbourg      
Director, Media Relations
Canada Health Infoway
Tel.: (416) 595-3424
dstrasbourg@infoway-inforoute.ca

This information is being distributed to you by CNW Group Ltd.
To discontinue this service, click here.

Ces renseignements vous ont été distribués par le Groupe CNW Ltée.
Pour mettre fin à ce service, cliquez ici.

© 2012 CNW Group Ltd, all rights reserved
© 2012 Groupe CNW Ltée, tous droits réservés

RIM Launches BlackBerry 10 Platform

RIM Launches BlackBerry 10 Platform

Developers get powerful tools in advance to build apps that deliver highly engaging mobile experiences for users

Orlando, FL - BlackBerry World 2012 / BlackBerry 10 Jam - Research In Motion (RIM) (NASDAQ: RIMM; TSX: RIM) today unveiled its vision for the BlackBerry® 10 platform at the BlackBerry World™ conference in Orlando, Florida and released the initial developer toolkit for native and HTML5 software development. The toolkit is available in beta as a free download from http://developer.blackberry.com.

“BlackBerry 10 builds upon the core values and exceptional user experiences that have attracted more than 77 million BlackBerry customers around the world today,” said Alec Saunders, Vice President, Developer Relations and Ecosystems Development. “Developers building for BlackBerry 10 will be able to easily create the kind of cutting-edge apps that deliver truly engaging experiences and ‘wow’ customers, whether through integration with native features and other apps like BBM or by leveraging the new signature design elements of this new and powerful mobile computing platform.”

“There is tremendous interest, anticipation and momentum building toward the launch of BlackBerry 10 devices, and today we’re extremely excited to release the BlackBerry 10 developer beta tools for general use,” said Christopher Smith, Vice President, Handheld Application Platform and Tools at Research In Motion. “Developers can use this first beta of the tools to get started building apps for BlackBerry 10 and as the tools evolve over the coming months, developers will have access to a rich API set that will allow them to build even more integrated apps. The toolkit we are delivering today also meets developers on their own terms. Whether using the powerful Cascades framework, writing direct native code or developing in HTML5, BlackBerry 10 will empower developers to create attractive and compelling apps that excite customers.”

The toolkit includes the BlackBerry® 10 Native SDK with Cascades, which allows developers to create graphically rich, high performance native applications in C/C++ using Qt. The Native SDK for BlackBerry 10 has a rich set of APIs (Application Programming Interfaces) that give developers access to core device features and a range of BlackBerry application services, such as Push and Payment services. Cascades is a powerful native application development toolset that allows developers to easily build visually stunning applications without having to write complex, low-level graphics code.

More details about the NDK for BlackBerry 10 are posted on http://devblog.blackberry.com/2012/04/blackberry-10-native-sdk and for Cascades at http://devblog.blackberry.com/2012/04/blackberry-10-cascades-available-now.

The toolkit also includes support for HTML5 application developers with the BlackBerry 10 WebWorks™ SDK, allowing them to create native-like applications using common web programming technologies. The BlackBerry 10 WebWorks SDK allows developers to use HTML5 and CSS for building apps and provides JavaScript bindings to native device APIs along with RIM’s open source UI toolkit, bbUI.js, to create applications with native-like capabilities. In this initial release of the BlackBerry 10 WebWorks SDK, developers have access to a core subset of the full WebWorks APIs, including Identity, Application and App events, System and system events. More details about the BlackBerry 10 WebWorks SDK are posted on http://devblog.blackberry.com/2012/04/blackberry-10-webworks-sdk.

Applications created with any of the BlackBerry 10 tools will run on BlackBerry 10 smartphones as well as BlackBerry® PlayBook™ tablets when the new platform becomes available for the PlayBook. All of the SDKs will be updated to give developers access to more of the BlackBerry 10 unique capabilities over the coming months.

To further help developers get started on the BlackBerry 10 platform, BlackBerry 10 Jam attendees are being provided a BlackBerry 10 Dev Alpha device. This testing unit is a further commitment from RIM to provide the developer community with the tools they need to build successful applications for BlackBerry 10 devices, so that they are ready when the first BlackBerry 10 devices are expected to launch in the latter part of 2012.

The NDK for BlackBerry 10, including Cascades, is available for download at http://developer.blackberry.com/native/download.

The BlackBerry 10 WebWorks SDK is available at http://developer.blackberry.com/html5/download.

Additional Useful Links for Developers:
BlackBerry Jam Zone: http://developer.blackberry.com
@BlackBerryDev: http://www.twitter.com/blackberrydev
Developer Success Stories: https://bdsc.webapps.blackberry.com/devzone/whyblackberry/stories

About Research In Motion
Research In Motion (RIM), a global leader in wireless innovation, revolutionized the mobile industry with the introduction of the BlackBerry® solution in 1999. Today, BlackBerry products and services are used by millions of customers around the world to stay connected to the people and content that matter most throughout their day. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe, Asia Pacific and Latin America. RIM is listed on the NASDAQ Stock Market (NASDAQ: RIMM) and the Toronto Stock Exchange (TSX: RIM). For more information, visit www.rim.com or www.blackberry.com.

Forward-looking statements in this news release are made pursuant to the "safe harbor" provisions of the U.S. Private Securities Litigation Reform Act of 1995 and applicable Canadian securities laws.  When used herein, words such as "expect", "anticipate", "estimate",  "may",  "will", "should", "intend," "believe", and similar expressions, are intended to identify forward-looking statements.  Forward-looking statements are based on estimates and assumptions made by RIM in light of its experience and its perception of historical trends, current conditions and expected future developments, as well as other factors that RIM believes are appropriate in the circumstances.  Many factors could cause RIM's actual results, performance or achievements to differ materially from those expressed or implied by the forward-looking statements, including those described in the "Risk Factors" section of RIM's Annual Information Form, which is included in its Annual Report on Form 40-F (copies of which filings may be obtained at www.sedar.com or www.sec.gov).  These factors should be considered carefully, and readers should not place undue reliance on RIM's forward-looking statements.  RIM has no intention and undertakes no obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise, except as required by law.

The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks of Research In Motion Limited. RIM, Research In Motion and BlackBerry are registered with the U.S. Patent and Trademark Office and may be pending or registered in other countries. All other brands, product names, company names, trademarks and service marks are the properties of their respective owners. RIM assumes no obligations or liability and makes no representation, warranty, endorsement or guarantee in relation to any aspect of any third party products or services.

HP regains top spot in client PC market

HP regains top spot in client PC market

Overall client PC market up 21%, but the coming quarters present challenges

Shanghai, Palo Alto, Singapore and Reading – Tuesday, 1 May 2012

HP retook the lead in the worldwide client PC market in Q1 2012, according to the latest figures published by analyst firm Canalys. Apple had ousted the long-time PC market leader in Q4 2011, thanks largely to record iPad shipments (in excess of 15 million units). In Q1, however, Apple shipped 11.8 million iPads, bringing its total client PC number for the quarter to 15.8 million. HP's shipments were higher by around 40,000 units, according to Canalys estimates; just enough to give it the lead. Lenovo took third place, with impressive year-on-year growth of 50%. Acer and Dell took the remaining top-five places, but with shipments down on the same quarter a year ago. The total client PC market grew by 21% to 107 million units. Importantly, while the pad category exhibited the highest growth – more than 200% year on year – notebook and desktop PC shipments were up too, rising 11% and 8% respectively. Netbook shipments, however, were down 34% on the year-ago quarter – the sixth such fall in succession.

'Most of the leading PC vendors have done a reasonable job of offsetting the declines in their netbook shipments over the past year with increased pad business,' said Canalys Research Analyst Tom Evans. 'Samsung and Lenovo are two that stand out in terms of substantially increasing overall volume, though Asus has performed well too. The challenge is breaking out into the really big volumes to challenge the leaders – Apple and Amazon. So far, only Samsung has shown it can routinely ship more than a million pads a quarter.'

Globally, Canalys reports that pads represented 19% of all client PC shipments in Q1, up substantially from 7% a year ago, but down on the 22% recorded in Q4 2011. Netbooks have fallen to 5% from a high of 13% two years ago. Notebooks represented just under half of the overall market by units.

Looking at overall client PC shipments by region, Canalys estimates that North America grew 31% year-on-year, compared to 19% for both EMEA (Europe, Middle East and Africa) and Asia-Pacific. Latin American growth lagged at only 10%. But Canalys points out that the growth in North America was being boosted by pads much more than in the other regions.

'If you look at the US, pads are approaching 40% of all client PC shipments,' said Canalys VP and Principal Analyst, Chris Jones. 'The rest of the market here was down slightly in Q1. The pad proposition for US consumers is very strong – thanks to the wider choice in content and apps – and the impact on the other categories is more severe.'

So despite some positive signs in Q1, PC vendors face ongoing uncertainty in the coming quarters. Turbulence in the economy means the consumer market in many countries remains a cause for concern. Q2 is expected to be soft, with Taiwanese notebook ODMs having reported a decline in shipments in April. This will improve as the channel sells out older products and vendors refresh their portfolios with models based on Intel's Ivy Bridge processors. The big transition will take place in the second half of the year with Microsoft's launch of Windows 8. This will lead many consumers to delay new PC purchases into Q4. But by then thin and light laptops will be approaching mainstream price points and a new wave of pads, based on Microsoft's new OS, will be hitting the market. Positive reception to Windows 8, on all PC form factors, is critical. Assuming this is achieved, PC vendors will be able to look forward to 2013 with renewed optimism.

About Canalys

Canalys delivers smart market insights to IT, channel and service provider professionals around the world. Our customer-driven analysis and consulting services empower businesses to make informed decisions and generate sales. We stake our reputation on the quality of our data, our innovative use of technology, and our high level of customer service.

Annual Symantec Internet Security Threat Report Reveals 81 Percent Increase in Malicious Attacks

Annual Symantec Internet Security Threat Report Reveals 81 Percent Increase in Malicious Attacks

MOUNTAIN VIEW, Calif. – April 30, 2012 – Symantec Corp. (Nasdaq: SYMC) today announced the findings of its Internet Security Threat Report, Volume 17, which shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In addition, the report highlights that advanced targeted attacks are spreading to organizations of all sizes and variety of personnel, data breaches are increasing, and that attackers are focusing on mobile threats.


Read more detailed blog posts:


Malicious Attacks Continue to Grow Rapidly

Symantec blocked more than 5.5 billion malicious attacks in 2011, an increase of 81 percent over the previous year. In addition, the number of unique malware variants increased to 403 million and the number of Web attacks blocked per day increased by 36 percent.


At the same time, spam levels fell considerably and new vulnerabilities discovered decreased by 20 percent. These statistics, compared to the continued growth in malware, paint an interesting picture. Attackers have embraced easy to use attack toolkits to efficiently leverage existing vulnerabilities. Moving beyond spam, cyber criminals are then turning to social networks to launch their attacks. The very nature of these networks makes users incorrectly assume they are not at risk and attackers are using these sites to target new victims. Due to social engineering techniques and the viral nature of social networks, it’s much easier for threats to spread from one person to the next.


Advanced Targeted Attacks Spread to Organizations of All Sizes

Targeted attacks are growing, with the number of daily targeted attacks increasing from 77 per day to 82 per day by the end of 2011. Targeted attacks use social engineering and customized malware to gain unauthorized access to sensitive information. These advanced attacks have traditionally focused on public sector and government; however, in 2011, targeted attacks diversified.


Targeted attacks are no longer limited to large organizations. More than 50 percent of such attacks target organizations with fewer than 2,500 employees, and almost 18 percent target companies with fewer than 250 employees. These organizations may be targeted because they are in the supply chain or partner ecosystem of a larger company and because they are less well-defended. Furthermore, 58 percent of attacks target non-execs, employees in roles such as human resources,, public relations, and sales. Individuals in these jobs may not have direct access to information, but they can serve as a direct link into the company. They are also easy for attackers to identify online and are used to getting proactive inquiries and attachments from unknown sources.


Rise of Data Breaches, Lost Devices Concern for the Future

Approximately 1.1 million identities were stolen per data breach on average in 2011, a dramatic increase over the amount seen in any other year. Hacking incidents posed the greatest threat, exposing 187 million identities in 2011—the greatest number for any type of breach last year. However, the most frequent cause of data breaches that could facilitate identity theft was theft or loss of a computer or other medium on which data is stored or transmitted, such as a smartphone, USB key or a backup device. These theft-or loss-related breaches exposed 18.5 million identities.


As tablets and smartphones continue to outsell PCs, more sensitive information will be available on mobile devices. Workers are bringing their smartphones and tablets into the corporate environment faster than many organizations are able to secure and manage them. This may lead to an increase in data breaches as lost mobile devices present risks to information if not properly protected. Recent research by Symantec shows that 50 percent of lost phones will not be returned and 96 percent (including those returned) will experience a data breach.


Mobile Threats Expose Businesses and Consumers

Mobile vulnerabilities increased by 93 percent in 2011. At the same time, there was a rise in threats targeting the Android operating system. With the number of vulnerabilities in the mobile space rising and malware authors not only reinventing existing malware for mobile devices, but creating mobile-specific malware geared to the unique mobile opportunities, 2011 was the first year that mobile malware presented a tangible threat to businesses and consumers. These threats are designed for activities including data collection, the sending of content, and user tracking.


Click to Tweet: Symantec blocked more than 5.5 billion attacks in 2011: http://bit.ly/K8NeJ8

Click to Tweet: #ISTR 1.1 million identities stolen per breach last year: http://bit.ly/K8NeJ8

Click to Tweet: Hackers exposed 187 million identities in 2011: http://bit.ly/K8NeJ8

Click to Tweet: Mobile vulnerabilities increased by 93% in 2011, #ISTR: http://bit.ly/K8NeJ8

Click to Tweet: Advanced targeted attacks spread to organizations of all sizes and information workers: http://bit.ly/K8NeJ8


Quote

“In 2011 cybercriminals greatly expanded their reach, with nearly 20% of targeted attacks now directed at companies with fewer than 250 employees,” said Stephen Trilling, Chief Technology Officer, Symantec. “We’ve also seen a large increase in attacks on mobile devices, making these devices a viable platform for attackers to leverage in targeting sensitive data. Organizations of all sizes need to be vigilant about protecting their information.”


About the Symantec Internet Security Threat Report

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.


About Security Technology and Response

The Security Technology and Response (STAR) organization, which includes Security Response, is a worldwide team of security engineers, threat analysts and researchers that provides the underlying functionality, content and support for all Symantec corporate and consumer security products. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and updates several thousand times every second. This network monitors attack activity in more than 200 countries and territories and tracks more than 47,000 vulnerabilities affecting more than 40,000 products from more than 15,000 vendors. Spam, phishing and malware data is captured through a variety of sources, including the Symantec Probe Network, Skeptic, Symantec.cloud and a number of other Symantec security technologies. The team uses this vast intelligence to develop and deliver the world’s most comprehensive security protection.


About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.