Symantec
Displaying 1-40 of 711 results
-
The Evolution and Value of Purpose-Built Backup Appliances
This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...
Sponsored By Symantec
-
Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments
This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...
Sponsored By Symantec
-
Symantec Internet Security Threat Report
Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...
Sponsored By Symantec
-
Cost of Data Breach Study -Italy 2013
Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...
Sponsored By Symantec
-
What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk
Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...
Sponsored By Symantec
-
Optimise your online business - A best practice guide
This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...
Sponsored By Symantec
-
Phishing: How to protect your business
You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...
Sponsored By Symantec
-
Securing the Mobile App Market
To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.
Sponsored By Symantec
-
Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs
The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.
This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...Provided By Symantec
-
Good for security, good for business
Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan.
This Symantec white paper addresses the two biggest hurdles that small...Provided By Symantec
-
How to provide secure single sign-on and identity based access control for cloud applications
This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...
Provided By Symantec
-
How threats can affect today's growing enterprise
This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.
Provided By Symantec
-
Exploiting the business potential of BYOD
The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...
Provided By Symantec
-
Adding up the cost of self-signed SSL certificates
Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...
Provided By Symantec
-
Best practice: Thwarting website security threats
How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.
Provided By Symantec
-
Bolster mobile app security with code signing
Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...
Provided By Symantec
-
Bolster mobile app security with code signing
Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...
Provided By Symantec
-
Adding up the cost of self-signed SSL certificates
Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...
Provided By Symantec
-
Best practice: Thwarting website security threats
How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.
Provided By Symantec
-
Choosing a Cloud Hosting Partner with Confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
Provided By Symantec
-
Securing Microsoft Exchange 2010 with VeriSign Authentication Services
Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...
Provided By Symantec
-
Five considerations when choosing an archiving solution
In this white paper, we explore the five key points that you should consider when choosing an archiving solution:
- Think long-term;
- Evaluate how easy it is to manage;
- Consider how much data you will need to monitor;
- Look out for solutions that are scalable and innovative;
...Provided By Symantec
-
Beginner's Guide to SSL Certificates
Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.
Provided By Symantec
-
Best Practices and Applications of TLS (Transport Layer Security)/SSL
Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Provided By Symantec
-
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.
Provided By Symantec
-
Internet Trust Marks: Building Confidence and Profit Online
Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.
Provided By Symantec
-
How Extended Validation SSL Brings Confidence to Online Sales and Transactions
Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Provided By Symantec
-
Reducing the cost and complexity of Web Vulnerability Management
Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Provided By Symantec
-
Security and Trust: The Backbone of Doing Business Over the Internet
Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.
Provided By Symantec
-
Spoofing Server-Server Communication: How You Can Prevent It
Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.
Provided By Symantec
-
The Shortcut Guide to Protecting Against Web Application Threats Using SSL
Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Provided By Symantec
-
Protecting Against Firesheep and Sidejacking
Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.
Provided By Symantec
-
Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise
Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.
Provided By Symantec
-
Simplify SSL Certificate Management Across the Enterprise
Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.
Provided By Symantec
-
Grow Your Business by Building Consumer Trust
Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.
Provided By Symantec
-
The Hidden Costs of Self-Signed Certificates
Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...
Provided By Symantec
-
Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance
Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...
Provided By Symantec
-
Protecting Your Website With Always On SSL
Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...
Provided By Symantec
-
Protecting Android Applications
Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.
Provided By Symantec
-
Code Signing for Adobe AIR
Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.
Provided By Symantec
-
What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk
Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...
Sponsored By Symantec
-
Cost of Data Breach Study -Italy 2013
Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...
Sponsored By Symantec
-
Optimise your online business - A best practice guide
This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...
Sponsored By Symantec
-
Securing the Mobile App Market
To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.
Sponsored By Symantec
-
Phishing: How to protect your business
You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...
Sponsored By Symantec
-
The Evolution and Value of Purpose-Built Backup Appliances
This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...
Sponsored By Symantec
-
Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments
This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...
Sponsored By Symantec
-
Symantec Internet Security Threat Report
Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...
Sponsored By Symantec
-
Backup administrators speak out
In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...
Provided By Symantec
-
Backup administrators speak out
In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...
Provided By Symantec
-
Five considerations when choosing an archiving solution
In this white paper, we explore the five key points that you should consider when choosing an archiving solution:
- Think long-term;
- Evaluate how easy it is to manage;
- Consider how much data you will need to monitor;
- Look out for solutions that are scalable and innovative;
...Provided By Symantec
-
Beginner's Guide to SSL Certificates
Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.
Provided By Symantec
-
Best Practices and Applications of TLS (Transport Layer Security)/SSL
Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Provided By Symantec
-
Securing Microsoft Exchange 2010 with VeriSign Authentication Services
Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...
Provided By Symantec
-
Choosing a Cloud Hosting Partner with Confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
Provided By Symantec
-
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.
Provided By Symantec
-
Internet Trust Marks: Building Confidence and Profit Online
Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.
Provided By Symantec
-
How Extended Validation SSL Brings Confidence to Online Sales and Transactions
Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Provided By Symantec
-
Reducing the cost and complexity of Web Vulnerability Management
Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Provided By Symantec
-
Security and Trust: The Backbone of Doing Business Over the Internet
Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.
Provided By Symantec
-
Spoofing Server-Server Communication: How You Can Prevent It
Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.
Provided By Symantec
-
The Shortcut Guide to Protecting Against Web Application Threats Using SSL
Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Provided By Symantec
-
Protecting Against Firesheep and Sidejacking
Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.
Provided By Symantec
-
Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise
Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.
Provided By Symantec
-
A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records
Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...
Provided By Symantec
-
Simplify SSL Certificate Management Across the Enterprise
Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.
Provided By Symantec
-
Grow Your Business by Building Consumer Trust
Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.
Provided By Symantec
-
The Hidden Costs of Self-Signed Certificates
Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...
Provided By Symantec
-
Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance
Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...
Provided By Symantec
-
Protecting Your Website With Always On SSL
Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...
Provided By Symantec
-
Protecting Android Applications
Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.
Provided By Symantec
-
Code Signing for Adobe AIR
Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.
Provided By Symantec
-
The Essential Series: Code Signing Certificates
Download this white paper, The Essential Series: Code Signing Certificates, and learn about the many ways in which code signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Provided By Symantec
-
Adding up the cost of self-signed SSL certificates
Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...
Provided By Symantec
-
Best practice: Thwarting website security threats
How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.
Provided By Symantec
-
Legal Compliance in Electronic Record Keeping
Legislation dictates that companies must ensure the secure retention of records and information with emails making up a significant amount of such "records". Regulated retention is a major issue for non-government organizations. This paper outlines the key points that you need to ensure your company is dispute ready with proper...
Provided By Symantec
-
Exploiting the business potential of BYOD
The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...
Provided By Symantec
-
How threats can affect today's growing enterprise
This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.
Provided By Symantec
-
How to provide secure single sign-on and identity based access control for cloud applications
This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...
Provided By Symantec
-
Good for security, good for business
Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan.
This Symantec white paper addresses the two biggest hurdles that small...Provided By Symantec