Symantec

Displaying 1-40 of 536 results

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Provided By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Provided By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Provided By Symantec

  • eBooks // Jan 2013

    How threats can affect today's growing enterprise

    This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing a Cloud Hosting Partner with Confidence

    Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Microsoft Exchange 2010 with VeriSign Authentication Services

    Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Private Keys as Best Practice for Code Signing Certificates

    Securing Your Private Keys as Best Practice for Code Signing Certificates Download this guide, Securing Your Private Keys as Best Practice for Code Signing Certificates to learn how to safeguard your code signing private keys from increasingly, extremely sophisticated malware attacks, such as Stuxnet.

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution: - Think long-term; - Evaluate how easy it is to manage; - Consider how much data you will need to monitor; - Look out for solutions that are scalable and innovative;...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Private Keys as Best Practice for Code Signing Certificates

    Securing Your Private Keys as Best Practice for Code Signing Certificates Download this guide, Securing Your Private Keys as Best Practice for Code Signing Certificates to learn how to safeguard your code signing private keys from increasingly, extremely sophisticated malware attacks, such as Stuxnet.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Jun 2012

    Legal Compliance in Electronic Record Keeping

    Legislation dictates that companies must ensure the secure retention of records and information with emails making up a significant amount of such "records". Regulated retention is a major issue for non-government organizations. This paper outlines the key points that you need to ensure your company is dispute ready with proper...

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • eBooks // Jan 2013

    How threats can affect today's growing enterprise

    This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security.

    As use of the Internet has become increasingly commonplace and crucial to a wide range of applications, criminals have found an ever-growing group of people they can target. Apart from hurting users, this activity is detrimental to the brand of the real site being spoofed. Without trust, no website or...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Provided By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Provided By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Aug 2008

    Top Reasons to Upgrade to Backup Exec 12.5 and Backup Exec System Recovery 8.5

    With more than two decades of data protection experience, Symantec Backup Exec? and Backup Exec System Recovery provide complementary technologies that together minimize the impact of system downtime and data loss. With over three million servers protected globally, organizations around the world count on Symantec Backup Exec technology. If your...

    Provided By Symantec