Symantec

Displaying 1-40 of 587 results

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Sponsored By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Sponsored By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Sponsored By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Sponsored By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Sponsored By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Provided By Symantec

  • eBooks // Jan 2013

    How threats can affect today's growing enterprise

    This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing a Cloud Hosting Partner with Confidence

    Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Microsoft Exchange 2010 with VeriSign Authentication Services

    Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution: - Think long-term; - Evaluate how easy it is to manage; - Consider how much data you will need to monitor; - Look out for solutions that are scalable and innovative;...

    Provided By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.

    Provided By Symantec

  • White Papers // Oct 2012

    Best Practices and Applications of TLS (Transport Layer Security)/SSL

    Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.

    Provided By Symantec

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Sponsored By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Sponsored By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Sponsored By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Sponsored By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Oct 2012

    Backup administrators speak out

    In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...

    Provided By Symantec

  • White Papers // Oct 2012

    Backup administrators speak out

    In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution: - Think long-term; - Evaluate how easy it is to manage; - Consider how much data you will need to monitor; - Look out for solutions that are scalable and innovative;...

    Provided By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.

    Provided By Symantec

  • White Papers // Oct 2012

    Best Practices and Applications of TLS (Transport Layer Security)/SSL

    Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Microsoft Exchange 2010 with VeriSign Authentication Services

    Download Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names to help you take the guesswork out of implementing SSL for Exchange 2010 and learn how to take advantage of powerful capabilities such as Subject Alternative Names...

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing a Cloud Hosting Partner with Confidence

    Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.

    Provided By Symantec

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Provided By Symantec

  • White Papers // Dec 2011

    A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

    Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Provided By Symantec

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security.

    As use of the Internet has become increasingly commonplace and crucial to a wide range of applications, criminals have found an ever-growing group of people they can target. Apart from hurting users, this activity is detrimental to the brand of the real site being spoofed. Without trust, no website or...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // Sep 2010

    Building Full IT Infrastructure Protection: How Midsize Firms Can Rise to the Challenge

    Midsize firms are in a challenging position when it comes to implementing, managing, and protecting their IT resources. This Executive Brief is designed to help technology decision makers look at their technology environments comprehensively to ensure that they are coordinating security and storage resources in a way that provides the...

    Provided By Symantec

  • White Papers // Oct 2010

    Small Business Endpoint Protection Performance Benchmarks

    PassMark Software conducted objective performance testing on five publically available small business endpoint protection security software products on Windows 7 Ultimate Edition in September 2010. The software was tested using 13 different performance metrics. Download the report to see the results.

    Provided By Symantec