Symantec.cloud

Displaying 1-18 of 18 results

  • White Papers // Nov 2013

    The Dangers of not Addressing the Data Retention Issue

    As customer data storage requirements have risen exponentially, data and document retention and how long data should be stored for is becoming increasingly important. Not only must organisations ensure that they adhere to the wide-ranging legal requirements for retention but they should also have appropriate data retention policies so as...

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    Symantec™ Email Security.cloud - Skeptic™

    This white paper outlines the technical approach we use to deliver Symantec™ Email Security.cloud and protect your business from emailborne spam, phishing, malware, and targeted attacks without the need for on-premise software or hardware.

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam

    The ever-increasing availability of faster, wireless network access, wirelessly enabled laptops and other devices, and collaboration tools such as Instant Messaging (IM) are turning the traditional office into an un-tethered workspace that can happen just about anywhere, any time. But all this poses new challenges for IT departments who must...

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    Why Should You Encrypt Email and What Happens if You Don’t?

    Encryption is absolutely essential to protect data both in transit and at rest. However, most sensitive or confidential content sent through email is not encrypted, but instead is sent in clear text and so exposed to potential interception. This puts the owners of this information and its recipients at serious...

    Provided By Symantec.cloud

  • White Papers // Nov 2012

    Meeting the Challenges of Endpoint Security

    Growing businesses face real difficulties in protecting their users, especially remote workers, while keeping management costs down. Majority use some kind of anti-virus software and firewall on their desktop and notebook PCs. But is it good enough? There is a difference between what companies say they do about...

    Provided By Symantec.cloud

  • White Papers // Oct 2012

    The Inevitable Extinction of PSTs

    Nearly all employees use PST files to preserve emails. This turns into a nightmare for administrators as when stored locally or on the network share.The main issues are: Huge impact on backup as they take up a lot of storage space Data corruption possibilities that...

    Provided By Symantec.cloud

  • White Papers // Sep 2012

    Taming your data mountain

    Coping with the ever-swelling data mountain can feel like scaling a sheer, slippery rock face - with the summit receding further and further away. But shouldn't it be about more than just 'coping'? Take email - often seen as an Everest in the mountain range of data bearing down on...

    Provided By Symantec.cloud

  • White Papers // Sep 2012

    Endpoint security: pressures and priorities

    Organisations are struggling to keep pace with the changing security needs and demands of their user base. Well-established trends such as the move to mobile and flexible working and the consumerisation of IT mean that there is increasing pressure on organisations to open up their infrastructure to end users who...

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    2012 Olympics: Is your business prepared?

    Athletes prepare for all kinds of conditions and problems in competition. With the London-hosted Olympics fast approaching, businesses should be prepared with policies to keep performance high during the games. This factsheet from Symantec.cloud looks at possible IT and security issues that could affect business during the 2012 Olympics.

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    10 safety tips for business in 2012

    Remember 2011? It seems like so long ago, with the speed of IT moving faster all the time. Data keeps growing, social media and mobile opportunities are expanding, and employees are frequently working from remote locations. Meanwhile, cyber-criminals are getting more sophisticated. How can you protect your business? These 10...

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    Defining your data demands in simple steps

    Businesses have seen a deluge of data, with more devices, more platforms and more access -- and, of course, more ways to lose and leak information. By 2020, it's estimated that the world will generate 50 times as much information as it does today, but your organisation can manage this...

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    Protect data: Best practice for secure information

    Organisations need to show their customers and the industry that data protection is a high priority. There are risks involved with data growth, and companies should ensure that data is handled appropriately with strong, malware-resistant security systems in place to prevent data breaches or data leaks. This Symantec.cloud white paper...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    How malware threats have changed

    These days, cybercriminals have four core weapons: targeted attacks, infecting websites, social networking and mobile threats. The threat to businesses, from small business to the enterprise, has reached unprecedented heights in terms of volume, sophistication and potency.How exactly have malware threats changed to become so dangerous? What does this mean...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    Guide to social media use in your business

    Are you on Twitter, Facebook or Google ? Even if you're not, you should know about social networking's benefits and risks for business. There's no doubt social networking is becoming almost ubiquitous, but CIOs and IT managers aren't necessarily keen on it. Social networking can have business benefits, but it...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    Deliver easy email search, storage and retrieval systems

    Are you storing up trouble? There is a better way to manage corporate email storage, especially to: Avoid overwhelming an IT manager with requests to help email users locate missing or deleted messages; Help email users find messages from clients or colleagues containing vital information; The...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    Why is encryption important?

    Data protection has become a hot topic, but where is the real threat and what can you do to protect your business? How do you protect data 'at rest' and data 'in transit'? How can you protect against the threat of espionage, hacktivism, spyware, or insider negligence or wrongdoing? If...

    Provided By Symantec.cloud

  • White Papers // Nov 2011

    Bandwidth Bandits

    Internet bandwidth is a finite and expensive resource; protect it from spammers, criminals, hackers, time-wasters and employee misuse. Our analysis shows that companies can lose around a quarter of their internet bandwidth to employee web misuse, streaming media and spam. Most companies don't even know about the loss,...

    Provided By Symantec.cloud

  • White Papers // Nov 2011

    Networking or Not Working

    Connect. Share. Work? Facebook isn't just a social networking tool. It's a social phenomenon which poses a real dilemma for businesses. Allow employees access...and risk opening a potential Pandora's box of problems? Go for a blanket ban...and lose a valuable channel of communication and collaboration? Opt for a...

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    2012 Olympics: Is your business prepared?

    Athletes prepare for all kinds of conditions and problems in competition. With the London-hosted Olympics fast approaching, businesses should be prepared with policies to keep performance high during the games. This factsheet from Symantec.cloud looks at possible IT and security issues that could affect business during the 2012 Olympics.

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    10 safety tips for business in 2012

    Remember 2011? It seems like so long ago, with the speed of IT moving faster all the time. Data keeps growing, social media and mobile opportunities are expanding, and employees are frequently working from remote locations. Meanwhile, cyber-criminals are getting more sophisticated. How can you protect your business? These 10...

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    Defining your data demands in simple steps

    Businesses have seen a deluge of data, with more devices, more platforms and more access -- and, of course, more ways to lose and leak information. By 2020, it's estimated that the world will generate 50 times as much information as it does today, but your organisation can manage this...

    Provided By Symantec.cloud

  • White Papers // Feb 2012

    Protect data: Best practice for secure information

    Organisations need to show their customers and the industry that data protection is a high priority. There are risks involved with data growth, and companies should ensure that data is handled appropriately with strong, malware-resistant security systems in place to prevent data breaches or data leaks. This Symantec.cloud white paper...

    Provided By Symantec.cloud

  • White Papers // Nov 2011

    Bandwidth Bandits

    Internet bandwidth is a finite and expensive resource; protect it from spammers, criminals, hackers, time-wasters and employee misuse. Our analysis shows that companies can lose around a quarter of their internet bandwidth to employee web misuse, streaming media and spam. Most companies don't even know about the loss,...

    Provided By Symantec.cloud

  • White Papers // Nov 2012

    Meeting the Challenges of Endpoint Security

    Growing businesses face real difficulties in protecting their users, especially remote workers, while keeping management costs down. Majority use some kind of anti-virus software and firewall on their desktop and notebook PCs. But is it good enough? There is a difference between what companies say they do about...

    Provided By Symantec.cloud

  • White Papers // Nov 2011

    Networking or Not Working

    Connect. Share. Work? Facebook isn't just a social networking tool. It's a social phenomenon which poses a real dilemma for businesses. Allow employees access...and risk opening a potential Pandora's box of problems? Go for a blanket ban...and lose a valuable channel of communication and collaboration? Opt for a...

    Provided By Symantec.cloud

  • White Papers // Sep 2012

    Taming your data mountain

    Coping with the ever-swelling data mountain can feel like scaling a sheer, slippery rock face - with the summit receding further and further away. But shouldn't it be about more than just 'coping'? Take email - often seen as an Everest in the mountain range of data bearing down on...

    Provided By Symantec.cloud

  • White Papers // Sep 2012

    Endpoint security: pressures and priorities

    Organisations are struggling to keep pace with the changing security needs and demands of their user base. Well-established trends such as the move to mobile and flexible working and the consumerisation of IT mean that there is increasing pressure on organisations to open up their infrastructure to end users who...

    Provided By Symantec.cloud

  • White Papers // Oct 2012

    The Inevitable Extinction of PSTs

    Nearly all employees use PST files to preserve emails. This turns into a nightmare for administrators as when stored locally or on the network share.The main issues are: Huge impact on backup as they take up a lot of storage space Data corruption possibilities that...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    Deliver easy email search, storage and retrieval systems

    Are you storing up trouble? There is a better way to manage corporate email storage, especially to: Avoid overwhelming an IT manager with requests to help email users locate missing or deleted messages; Help email users find messages from clients or colleagues containing vital information; The...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    Why is encryption important?

    Data protection has become a hot topic, but where is the real threat and what can you do to protect your business? How do you protect data 'at rest' and data 'in transit'? How can you protect against the threat of espionage, hacktivism, spyware, or insider negligence or wrongdoing? If...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    How malware threats have changed

    These days, cybercriminals have four core weapons: targeted attacks, infecting websites, social networking and mobile threats. The threat to businesses, from small business to the enterprise, has reached unprecedented heights in terms of volume, sophistication and potency.How exactly have malware threats changed to become so dangerous? What does this mean...

    Provided By Symantec.cloud

  • White Papers // Jan 2012

    Guide to social media use in your business

    Are you on Twitter, Facebook or Google ? Even if you're not, you should know about social networking's benefits and risks for business. There's no doubt social networking is becoming almost ubiquitous, but CIOs and IT managers aren't necessarily keen on it. Social networking can have business benefits, but it...

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    The Dangers of not Addressing the Data Retention Issue

    As customer data storage requirements have risen exponentially, data and document retention and how long data should be stored for is becoming increasingly important. Not only must organisations ensure that they adhere to the wide-ranging legal requirements for retention but they should also have appropriate data retention policies so as...

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    Symantec™ Email Security.cloud - Skeptic™

    This white paper outlines the technical approach we use to deliver Symantec™ Email Security.cloud and protect your business from emailborne spam, phishing, malware, and targeted attacks without the need for on-premise software or hardware.

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam

    The ever-increasing availability of faster, wireless network access, wirelessly enabled laptops and other devices, and collaboration tools such as Instant Messaging (IM) are turning the traditional office into an un-tethered workspace that can happen just about anywhere, any time. But all this poses new challenges for IT departments who must...

    Provided By Symantec.cloud

  • White Papers // Nov 2013

    Why Should You Encrypt Email and What Happens if You Don’t?

    Encryption is absolutely essential to protect data both in transit and at rest. However, most sensitive or confidential content sent through email is not encrypted, but instead is sent in clear text and so exposed to potential interception. This puts the owners of this information and its recipients at serious...

    Provided By Symantec.cloud