Symantec

Displaying 1-40 of 463 results

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Provided By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Provided By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Provided By Symantec

  • eBooks // Jan 2013

    How threats can affect today's growing enterprise

    This Symantec WSS ebook explores the global threat landscape and how threats can affect today's growing enterprise. It discusses how centralised certificate management can help to create a more secure organisation, realise significant cost savings and free up resources.

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Feb 2009

    Enterprise Vault Automatic Classification Engine Enterprise Vault 8.0

    The Automatic Classification Engine was designed for organizations that do not want to rely on users to make classification decisions or impact their productivity. ACE is an ideal solution for applying context to an organization's archived data in the form of retention and searchable policies. Items classified by these policies...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) Intelligent Archiving solutions integrate with security features already built into Active Directory, SQL, and Enterprise Vault. It will also show how to manage access to the applications securely in line with organizational preferences. This whitepaper is...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

    This whitepaper discusses the security aspects of archiving from Sharepoint with Enterprise Vault 8.0. It has discussed permissions required on SharePoint servers as well as their requirements in IIS. It also discusses the client access methods such as links and Web-parts. This whitepaper assumes the reader has already read the...

    Provided By Symantec

  • White Papers // Feb 2009

    Intelligent Archiving With Enterprise Vault 8.0

    Enterprise Vault has many options to choose from when determining an Intelligent Archiving strategy. Either from an automatic, non-user impact, perspective or through extensions to an organization's current ECM solutions, Symantec can provide a solution that can meet the organization's needs to provide context to its archived data. With the...

    Provided By Symantec

  • White Papers // Feb 2009

    Security Model for Enterprise Vault 8.0 and SQL Server

    This whitepaper discusses a large majority of the security aspects of Enterprise Vault 8.0. It discusses how it keeps information secure from unauthorized viewing and how it secures store archived data and indexes. It also discusses administrative features like Roles Based administration, Auditing, and remote administration. Other relevant topics such...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 1 - Solution Overview

    This whitepaper provides a high-level overview of the PST problem, the issues with PST migration, and how the PST migration tools available in Enterprise Vault can solve them. PST files (also known as Personal Folders or Outlook data files) were not designed to handle the rigorous demands of today's large-scale...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 3 - Planning, Tech Tips & Best Practice

    This whitepaper looks at some important aspects of a PST migration project; namely, planning and best practice usage of the tools in different migration scenarios. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. One of the key decisions when planning PST migration is choosing the...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0: Archiving Lotus Domino for Storage Optimization & e-Discovery

    Whether an organization needs to archive for storage optimization, legal discovery, or both, Symantec Enterprise Vault for Domino provides a wide range of features that help it gain control over its rapidly growing messaging environment. The primary target audiences for this whitepaper are current and prospective Enterprise Vault administrators and...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec

  • White Papers // Jan 2009

    Managing Exchange Migrations With Symantec Enterprise Vault

    Many organizations are considering replacing their legacy messaging systems with Microsoft Exchange or upgrading from early versions. Whatever the drivers for these migrations are, all projects will face major challenges in terms of project timescales and increased business risks. With email being one of the most critical business applications used...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for File System Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory, NetApp Filers, and EMC Celerras. It also provides insight as to how to change some of the settings to be configured in line with organizational preferences....

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • White Papers // Mar 2009

    Security Model for Compliance Accelerator 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and Internet Explorer. It will also provide insight as to how to configure Compliance department roles to be configured in line with organizational preferences. This whitepaper...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for Secure Messaging 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) Secure Messaging Adapter can securely decrypt messages encrypted by RMS, PGP, and Liquid Machines Document Control. This whitepaper have also discussed the security aspects of the Enterprise Vault Adapter for Secure Messaging and Rights Management. It...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for SMTP Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and provide insight as to how to change some of the settings to be configured in line with organizational preferences. This whitepaper is intended to train...

    Provided By Symantec

  • White Papers // Mar 2009

    How Enterprise Vault Supports Exchange 2007 High Availability Options

    This paper outlines the high availability options introduced in Exchange 2007, namely LCR, CCR and SCR, and discusses how Enterprise Vault supports them. This paper is intended only to position these technologies with respect to Enterprise Vault and is not intended to be a deep level technical discussion or a...

    Provided By Symantec

  • White Papers // Sep 2008

    Symantec Endpoint Protection 11.0: Windows Small Business Server 2003 Best Practices White Paper

    This white paper provides guidance on how to successfully deploy the core Symantec Endpoint Protection 11.0 management and protection components to a Microsoft Small Business Server 2003. Note, to date the content of this paper has only been validated with the US English version of both Windows Small Business Server...

    Provided By Symantec

  • White Papers // Mar 2009

    Veritas Storage Foundation in a VMware ESX Environment: Linux and Solaris x64 Platforms

    This paper describes how to configure and use Veritas Storage Foundation in a VMware ESX environment. Because most features in Storage Foundation are supported in a VMware environment, this paper focuses on the features that work differently in a VMware environment and why certain features are not supported. The operating...

    Provided By Symantec

  • White Papers // May 2009

    Veritas Storage Foundation for Windows: Dynamic Multi-Pathing Competitive Comparisons

    Multi-pathing software provides the intelligence necessary to manage multiple I/O paths between a server and a storage subsystem. When configured for redundancy, a single path is dedicated to I/O transfer, while other paths are in standby mode. The software manages failover between the I/O paths, thus eliminating the potential for...

    Provided By Symantec

  • White Papers // May 2009

    Enterprise Vault 8.0: File System Archiving

    Enterprise Vault surpasses the scope, ability and performance of typical file management applications which merely move data based on broad policies from one storage device to another. As files are now routinely being requested for internal and external investigations, Enterprise Vault File System Archiving enables the organizations to meet their...

    Provided By Symantec

  • White Papers // May 2009

    VERITAS Storage Foundation Cluster File System 5.0 From Symantec: Using CFS for Oracle Fast Failover

    Symantec Cluster File System provides an efficient solution for fast failover of Oracle databases without incurring the cost and complexity of a Oracle RAC environment. It provides downtime SLAs within acceptable limits for most applications. The fundamental properties of CFS including access to shared file systems by applications running on...

    Provided By Symantec

  • White Papers // Oct 2008

    Exploring e-Discovery Tools

    STAYING ON TOP of legal requests and litigation holds doesn't have to be so complicated. There are basic technical tools that can help provide a level of preparedness for litigation - whether a company handles hundreds of lawsuits a year or only four or five annually and outsourcers the entire...

    Provided By Symantec

  • White Papers // Mar 2009

    Creating a Sustainable Infrastructure

    Compliance projects can bury organization in process and paperwork. Creating a sustainable compliance operation starts with using risk management to prioritize and continues with understanding how to leverage new technology in security, storage and networking infrastructure to create a true compliance infrastructure. The tools needed to become compliant are a...

    Provided By Symantec

  • White Papers // Mar 2009

    Risk, Readiness and Redundancy: PCI Compliance Automation With Symantec Control Compliance Suite

    For most of this decade, the major credit card companies have been aggressively developing standards to establish a common approach to protect the privacy and security of sensitive credit card data. In June 2001, Visa mandated the Cardholder Information Security Program (CISP) for merchants and financial institutions handling its card...

    Provided By Symantec

  • White Papers // Oct 2008

    IT Governance, Risk, and Compliance (IT GRC): An Organizational Imperative - What It Is, and Why You Should Know

    Regulatory mandates, emergence of new forms of risk, and a growing stakeholder focus on managing them are the principal drivers pressuring organizations to adopt IT Governance, Risk, and Compliance (IT GRC) strategies. Research shows that the key to success is introduction of a coherent system with a governance structure that...

    Provided By Symantec

  • White Papers // May 2009

    Essential Server Management for Mid-Sized Organizations: A Strategy for overcoming Challenges in Today's Complex and Costly IT Environments

    The task of server management is more costly and complex than ever. At the same time, there have never been greater expectations for IT departments to deliver business value to the organizations they serve. Altiris Server Management Suite from Symantec provides essential server management that enables IT administrators to focus...

    Provided By Symantec

  • Webcasts // Jan 2009

    Data Loss Prevention: Protect the Data That Drives Your Business

    How to prevent the loss of company's confidential data. The attendee will learn how Data Loss Prevention (DLP) solutions enable business and government organizations to safeguard their most valuable assets - intellectual property, customer data, and other sensitive information. Understand why DLP is a top 3 priority for CIOs in...

    Provided By Symantec

  • Webcasts // Jan 2009

    Protect Your Data and Maintain High Availability for Your VMware Environment With Veritas NetBackup and Cluster Server for VMware ESX

    Organizations are using server virtualization to reduce costs and achieve greater flexibility; however, the risk of reduced data and application availability has slowed the implementation of production applications in virtual machines. Veritas Cluster Server for VMware is a comprehensive high availability and disaster recovery solution for the ESX platform, providing...

    Provided By Symantec

  • Webcasts // Jan 2009

    Stop Buying Storage: Increase Storage Utilization With Veritas Storage Foundation & Veritas CommandCentral

    Data volumes are growing at 60% per year, while storage utilization rates hover around 35%. As organizations are aggressively seeking to contain costs, leveraging existing storage assets is the easy answer. The presenter of this webcast discusses how Veritas Storage Foundation and Veritas CommandCentral optimize existing storage assets relieving organizations...

    Provided By Symantec

  • Webcasts // Feb 2009

    In These Economic Times, How Can Endpoint Data Loss Prevention Help You Protect Confidential Information?

    When the economy creates a challenge for companies, they might look to reduce costs or evaluate hiring strategies. If a company is looking to reduce its workforce, how has it prepared to protect its intellectual property, customer and employee data? Recent research has shown that employees who fear losing their...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Microsoft Exchange Archiving and Retention Policy Development Featuring Old Dominion University

    The presenter will detail Old Dominion University's Notes to Exchange Migration which featured a Deployment of Microsoft Exchange 2007 and Symantec Enterprise Vault. The presenters will discuss few points such as deletion vs. Retention, exchange retention folders and archiving, records vs. non records and gives tips for simplifying the retention...

    Provided By Symantec

  • Webcasts // Feb 2009

    Why Is Off-Site Data Storage Important?

    Many small and medium sized businesses view off-site data protection services as a costly and unnecessary investment. However, new regulations, requirements and advancements have made off-site data a greater consideration. The presenter of this webcast examines off-site data storage and its role in disaster protection. Why is it necessary and...

    Provided By Symantec

  • Webcasts // Feb 2009

    Creating a Protected Endpoint and Messaging Environment with Symantec Multi-tier Protection

    Over 12,000 new malicious code threads are detected every day and 80% of all email identified as spam, the need to ensure complete protection is more important than ever before. The presenter of this webcast will discuss how Symantec Multi-tier Protection creates a protected endpoint and messaging environment while controlling...

    Provided By Symantec