Symantec

Displaying 1-40 of 711 results

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Sponsored By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Sponsored By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Sponsored By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Sponsored By Symantec

  • White Papers // Oct 2012

    Securing the Mobile App Market

    To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.

    Sponsored By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.

    This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan.

    This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • eBooks // Jan 2013

    How threats can affect today's growing enterprise

    This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing a Cloud Hosting Partner with Confidence

    Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Microsoft Exchange 2010 with VeriSign Authentication Services

    Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution:
    - Think long-term;
    - Evaluate how easy it is to manage;
    - Consider how much data you will need to monitor;
    - Look out for solutions that are scalable and innovative;
    ...

    Provided By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Best Practices and Applications of TLS (Transport Layer Security)/SSL

    Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Provided By Symantec

  • White Papers // Oct 2012

    Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance

    Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Your Website With Always On SSL

    Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Android Applications

    Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.

    Provided By Symantec

  • White Papers // Oct 2012

    Code Signing for Adobe AIR

    Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Sponsored By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Sponsored By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Sponsored By Symantec

  • White Papers // Oct 2012

    Securing the Mobile App Market

    To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.

    Sponsored By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Oct 2012

    Backup administrators speak out

    In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...

    Provided By Symantec

  • White Papers // Oct 2012

    Backup administrators speak out

    In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution:
    - Think long-term;
    - Evaluate how easy it is to manage;
    - Consider how much data you will need to monitor;
    - Look out for solutions that are scalable and innovative;
    ...

    Provided By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Best Practices and Applications of TLS (Transport Layer Security)/SSL

    Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Microsoft Exchange 2010 with VeriSign Authentication Services

    Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing a Cloud Hosting Partner with Confidence

    Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Symantec

    Provided By Symantec

  • White Papers // Dec 2011

    A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

    Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Symantec

    Provided By Symantec

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Provided By Symantec

  • White Papers // Oct 2012

    Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance

    Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Your Website With Always On SSL

    Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Android Applications

    Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.

    Provided By Symantec

  • White Papers // Oct 2012

    Code Signing for Adobe AIR

    Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.

    Provided By Symantec

  • White Papers // Oct 2012

    The Essential Series: Code Signing Certificates

    Download this white paper, The Essential Series: Code Signing Certificates, and learn about the many ways in which code signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Jun 2012

    Legal Compliance in Electronic Record Keeping

    Legislation dictates that companies must ensure the secure retention of records and information with emails making up a significant amount of such "records". Regulated retention is a major issue for non-government organizations. This paper outlines the key points that you need to ensure your company is dispute ready with proper...

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • eBooks // Jan 2013

    How threats can affect today's growing enterprise

    This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan.

    This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec