Symantec

Displaying 1-40 of 370 results

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Requirement for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Provided By Symantec

  • White Papers // Mar 2015

    The Cyber-Resilient Enterprise - Harnessing Your Security Intelligence

    An important shift has occurred in the security landscape of late. To keep pace in an ever more competitive world, businesses are adopting new ways of doing business, making them more dependent than ever on connected services and exposing them to new security challenges This paper details to IT leadership...

    Provided By Symantec

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Provided By Symantec

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Provided By Symantec

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Provided By Symantec

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Provided By Symantec

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Provided By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Provided By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Provided By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Provided By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Provided By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Provided By Symantec

  • Case Studies // Sep 2014

    A Tale of Two Malware Attacks: One Blocked and One Brutal

    How bad can it get when malware protection fails? And what can you do about it? CBS Interactive and Symantec are proud to present "A tale of two malware attacks: one blocked and one brutal," a cautionary tale that explores what goes wrong when users in small and medium-sized business...

    Provided By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Requirement for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Mar 2009

    Risk, Readiness and Redundancy: PCI Compliance Automation With Symantec Control Compliance Suite

    For most of this decade, the major credit card companies have been aggressively developing standards to establish a common approach to protect the privacy and security of sensitive credit card data. In June 2001, Visa mandated the Cardholder Information Security Program (CISP) for merchants and financial institutions handling its card...

    Provided By Symantec

  • White Papers // Apr 2009

    Veritas CommandCentral - Supporting the Virtual Enterprise

    Veritas CommandCentral is an enterprise storage management solution that provides the ability to manage storage effectively not only in the physical environment, but in the virtual environment as well. As organizations evaluate different physical and virtual solutions, it is imperative to consider the management implications of server and storage virtualization....

    Provided By Symantec

  • White Papers // Apr 2009

    Five Critical Recovery Flaws Your Last Disaster Recovery Test Missed

    Businesses today are spending millions of dollars to develop and maintain Disaster Recovery (DR) infrastructures that will ensure business continuity. But despite such huge investments of time and resources, most IT professionals are still not completely confident in their ability to recover in an emergency. This paper examines how automated...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 1 - Solution Overview

    This whitepaper provides a high-level overview of the PST problem, the issues with PST migration, and how the PST migration tools available in Enterprise Vault can solve them. PST files (also known as Personal Folders or Outlook data files) were not designed to handle the rigorous demands of today's large-scale...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 3 - Planning, Tech Tips & Best Practice

    This whitepaper looks at some important aspects of a PST migration project; namely, planning and best practice usage of the tools in different migration scenarios. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. One of the key decisions when planning PST migration is choosing the...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec APJ Internet Security Threat Report Trends for 2008

    The Symantec APJ Internet Security Threat Report provides an annual overview and analysis of Internet threat activity, a review of known vulnerabilities, and highlights of malicious code in the Asia-Pacific/Japan (APJ) region. Trends in phishing and spam are also assessed. Previously, Symantec presented data on a six-month basis. This volume...

    Provided By Symantec

  • White Papers // Apr 2009

    Can Heuristic Technology Help Your Company Fight Viruses?

    Electronic communication, which is an essential tool for businesses, is increasingly at risk due to the sophistication of email and web threats. Converging threats, combining viruses, spam and the web, to defraud unsuspecting victims or to disseminate malware make implementing reliable, effective protection essential for the corporate network and remote...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • White Papers // Mar 2009

    Future-Proof Your IT Infrastructure

    Today's tough economic climate is challenging companies to reduce costs while continuing to focus on improving efficiencies. For IT departments everywhere, it's truly a "do more with less" dilemma. Client and server management suites from Symantec allow organizations to significantly reduce the hidden costs of managing endpoint systems throughout the...

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • White Papers // Oct 2011

    Protecting the enterprise: Best practice for information security

    Keeping a connected enterprise secure requires both proactive and reactive approaches. The number of threats from cybercriminals -- malware, insider data breaches and even cyber-espionage -- is growing, so organisations should have consistent and unified barriers in place to prevent attacks and protect the business against them. This best practice...

    Provided By Symantec

  • White Papers // Nov 2011

    Guide to social media use in your business

    Are you on Twitter, Facebook or Google+? Even if you're not, you should know about social networking's benefits and risks for business. There's no doubt social networking is becoming almost ubiquitous, but CIOs and IT managers aren't necessarily keen on it. Social networking can have business benefits, but it brings...

    Provided By Symantec

  • White Papers // Apr 2012

    Malware threat landscape 2012: How to defend your business

    Every time you or one of your employees connects to the Internet, your organisation is at risk of infection by malware. Some methods of connection are safer than others, but the main vectors of a malware attack are the tools most employees and customers use every day: web browsing and...

    Provided By Symantec

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • Webcasts // Apr 2009

    Minimizing Risk - Will Your High Availability/Disaster Recovery Plan Work?

    Configuration drift is a major problem that IT professionals face and must manage in the event a disaster occurs. To address this issue, Symantec is introducing Veritas CommandCentral Disaster Recovery Advisor, an agentless solution that supports all major computing platforms. Disaster Recovery Advisor scans data center infrastructure to detect any...

    Provided By Symantec

  • Webcasts // Mar 2009

    Case Study: Best Practices in Endpoint Security: How a Leading Company Secured Their Endpoints and Infrastructure Using Symantec Services

    The attendee will learn the best practices and deployment strategy for a Symantec Network Access Control (SNAC)-based solution for a State agency. The agency had to provide non-employees network access to the internet and public records databases, while at the same time providing network access (to highly confidential data) to...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right: Cost, Risk and Readiness

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // Mar 2009

    Data Loss During Downsizing: When Employees Exit, so Does Data

    The presenter of this webcast addresses "Data Loss During Downsizing," the results of a survey conducted by the Ponemon Institute. In these tough economic times, many companies are going through layoffs or downsizing. According to the results, more than half of ex-employees admit to stealing company data. The attendee will...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Client Management Suite 7.0

    With the release of Altiris Client Management Suite 7.0, Symantec ushers in a new generation of client systems management. The presenter of this webcast shows some of the new and exciting features such as intelligent software management, integrated Cast of All Star technologies, power management, Windows, Mac and Linux support,...

    Provided By Symantec

  • Webcasts // Mar 2009

    Storage Strategy for a Down Economy: Stop Buying Storage!

    Unlocking the "Hidden" storage capacity in most data centers may allow data center managers to avoid capacity upgrades for a year or more. The presenter of this webcast will provide a four-step prescription for identifying available capacity and utilizing it effectively. Moreover, this is not a stop-gap program but rather...

    Provided By Symantec

  • Webcasts // Mar 2009

    Disaster Preparedness for Small Businesses: IT Strategies

    Small business requirements for IT solutions differ substantially from those of large businesses. A good IT solution provides contingent capacity, is simple and easy to operate. The presenter of this webcast discusses the vulnerabilities and threats that most directly affect the business. The presenter will share her recommendations for an...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec