Symantec

Displaying 361-400 of 538 results

  • White Papers // Mar 2009

    Symantec Online Backup: Technical Brief

    Symantec Online Backup provides businesses with secure, affordable backup and recovery for PCs and servers over the Internet. Unlike on-premise backup solutions, Symantec Online Backup is an on-demand service that requires only a small agent on local computers. It automatically stores customer backup data in secure, off-site data centers managed...

    Provided By Symantec

  • White Papers // Mar 2009

    How Veritas Storage Foundation Complements Microsoft Windows Server: Enhancing the Data Center

    Microsoft introduced several new storage management features in Windows Server 2003. In Windows Server 2008, they extend functionality to include the ability to shrink partitions and volumes online and DSMs to configure multi-pathing in iSCSI and FC environments. This paper will outline how Veritas Storage Foundation for Windows integrates and...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

    This whitepaper discusses the security aspects of archiving from Sharepoint with Enterprise Vault 8.0. It has discussed permissions required on SharePoint servers as well as their requirements in IIS. It also discusses the client access methods such as links and Web-parts. This whitepaper assumes the reader has already read the...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for File System Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory, NetApp Filers, and EMC Celerras. It also provides insight as to how to change some of the settings to be configured in line with organizational preferences....

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • White Papers // Mar 2009

    Security Model for Compliance Accelerator 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and Internet Explorer. It will also provide insight as to how to configure Compliance department roles to be configured in line with organizational preferences. This whitepaper...

    Provided By Symantec

  • White Papers // Mar 2009

    How Enterprise Vault Supports Exchange 2007 High Availability Options

    This paper outlines the high availability options introduced in Exchange 2007, namely LCR, CCR and SCR, and discusses how Enterprise Vault supports them. This paper is intended only to position these technologies with respect to Enterprise Vault and is not intended to be a deep level technical discussion or a...

    Provided By Symantec

  • White Papers // Mar 2009

    Veritas Storage Foundation in a VMware ESX Environment: Linux and Solaris x64 Platforms

    This paper describes how to configure and use Veritas Storage Foundation in a VMware ESX environment. Because most features in Storage Foundation are supported in a VMware environment, this paper focuses on the features that work differently in a VMware environment and why certain features are not supported. The operating...

    Provided By Symantec

  • Presentations // Mar 2009

    Learn How to Control Endpoints in this 3 minute video

    Security has evolved. It's no longer just about having anti-virus software and a firewall. Discover what critical steps and components you may be missing and how Symantec's Altiris endpoint management solutions can provide complete endpoint control and accelerate IT productivity and efficiency. View this product tour and register to download...

    Provided By Symantec

  • Webcasts // Feb 2009

    Solving Your Top 5 Microsoft Hyper-V Backup and Recovery Challenges

    Is the business planning to implement Microsoft Hyper-V in order to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several challenges. One of the biggest challenges is implementing a reliable backup and recovery solution to protect critical data distributed...

    Provided By Symantec

  • Webcasts // Feb 2009

    Creating a Protected Endpoint and Messaging Environment with Symantec Multi-tier Protection

    Over 12,000 new malicious code threads are detected every day and 80% of all email identified as spam, the need to ensure complete protection is more important than ever before. The presenter of this webcast will discuss how Symantec Multi-tier Protection creates a protected endpoint and messaging environment while controlling...

    Provided By Symantec

  • White Papers // Feb 2009

    Strategies to Increase Application Availability

    High-availability solutions are essential to maintain business continuity in today's 24x7 environment. But these solutions must be evaluated for their ability to address the business and technical needs of the organization in which they will be deployed. Through central management tools, automated failover, features to test disaster recovery plans without...

    Provided By Symantec

  • Webcasts // Feb 2009

    In These Economic Times, How Can Endpoint Data Loss Prevention Help You Protect Confidential Information?

    When the economy creates a challenge for companies, they might look to reduce costs or evaluate hiring strategies. If a company is looking to reduce its workforce, how has it prepared to protect its intellectual property, customer and employee data? Recent research has shown that employees who fear losing their...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Microsoft Exchange Archiving and Retention Policy Development Featuring Old Dominion University

    The presenter will detail Old Dominion University's Notes to Exchange Migration which featured a Deployment of Microsoft Exchange 2007 and Symantec Enterprise Vault. The presenters will discuss few points such as deletion vs. Retention, exchange retention folders and archiving, records vs. non records and gives tips for simplifying the retention...

    Provided By Symantec

  • White Papers // Feb 2009

    Compliance Rules: Rules and Tools, Policies and Best Practices for Cost-Effective, Comprehensive Compliance in the United States

    Organizations of all types and sizes, industries and professions have long been mindful of the need for legal and regulatory compliance. In the current economic environment, however, forward-thinking organizations now are shifting their focus somewhat. Mere adherence to laws and regulations is no longer enough. Thanks to tight economic conditions...

    Provided By Symantec

  • Webcasts // Feb 2009

    How to Do More With Less When Protecting Microsoft Exchange With Veritas NetBackup

    With everyone being asked to do more with less why shouldn't the backup application be asked the same? Symantec's Granular Recovery Technology eliminates MAPI backups and allows for the quick recovery of individual email messages and the entire application. The attendee will learn how to shorten the recovery time, backup...

    Provided By Symantec

  • Webcasts // Feb 2009

    Running Backups on a Budget - Protecting Your Data and the Bottom Line!

    Data volumes increase while IT budgets decrease. Efficiently leverage the Backup Exec Family to keep critical data protected and easily meets recovery point objectives without breaking the budget. The attendee will learn how to reduce storage utilization by more than 50% with patent pending granular recovery technology.

    Provided By Symantec

  • White Papers // Feb 2009

    Protection You Can Count On

    For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company's bottom line if that data isn't protected. SMBs should...

    Provided By Symantec

  • White Papers // Feb 2009

    A Storage Strategy for Tough Times

    In the current economic downturn, IT departments are being tasked to do more with less. And that means taking steps now to optimize existing storage assets. The good news is that the situation presents an opportunity to implement processes, procedures, and simple technologies to significantly reduce storage costs. Symantec is...

    Provided By Symantec

  • Webcasts // Feb 2009

    Small Business Backup: Your Data May Not Be as Protected as You Think

    The loss of critical data can be crippling to any business, still many small and mid-size companies do not adequately backup their data. An independent study conducted, reveals the pitfalls of poorly implemented backup strategies - and the real world consequences of unexpected data loss. This new study illuminates the...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Managing Business Risks From the Use of IT

    The presenter of this webcast focuses on the relationship between business risks and use of IT. The presenter of this webcast throws light on key business risks from the use of IT, financial outcomes and self-insurance thresholds and outcomes by industry and size of organization.

    Provided By Symantec

  • White Papers // Feb 2009

    Top 5 Security Tips for 2009

    Email, internet usage and electronic communication are used more and more in everyday business. In fact, one could say they are an absolutely essential tool for any organization today. They've brought a whole new world of ways to save money, time and hassle - from online banking to instant messaging...

    Provided By Symantec

  • Webcasts // Feb 2009

    Why Is Off-Site Data Storage Important?

    Many small and medium sized businesses view off-site data protection services as a costly and unnecessary investment. However, new regulations, requirements and advancements have made off-site data a greater consideration. The presenter of this webcast examines off-site data storage and its role in disaster protection. Why is it necessary and...

    Provided By Symantec

  • Webcasts // Feb 2009

    Epic Games Deploys Serious Archiving Technology With Enterprise Vault

    The attendee of this webcast will learn more about how Epic leveraged Symantec Enterprise Vault with Microsoft Exchange 2007 to meet storage optimization and E-Discovery demands. After utilizing archiving solutions from EMC and Mimosa, Epic Games migrated to Symantec Enterprise Vault and Discovery Accelerator.

    Provided By Symantec

  • Webcasts // Feb 2009

    Top 7 Backup Mistakes to Avoid in Windows Environment

    There are several common backup/restore mistakes that could be costing the money and even putting the business data at risk. The attendee will learn how Backup Exec for Windows 12.5 and Backup Exec System Recovery 8.5 can help to avoid these common backup mistakes in Windows environments.

    Provided By Symantec

  • White Papers // Feb 2009

    Stop Buying Storage Best Practices: Veritas CommandCentral Storage and Veritas Storage Foundation

    Having tools that provide not only visibility into the storage infrastructure, but also the mechanics to address the problems that are found is critical to reducing storage costs. The combined capabilities of CommandCentral and Storage Foundation uniquely enable Symantec customers to realize the value of storage management by reclaiming existing...

    Provided By Symantec

  • White Papers // Feb 2009

    Start Thin, Get Thin, and Stay Thin With Thin Provisioning Technology From Symantec and 3PAR

    This white paper discusses the fundamental problem that thin provisioning was designed to address - that of allocated-but-unused storage. It explains the concepts behind thin provisioning and describes key benefits in detail. It examines 3PAR Thin Provisioning software and also discusses how, for applications already deployed on legacy storage, IT...

    Provided By Symantec

  • White Papers // Feb 2009

    Protect Your Symantec Backup Exec Environment From Site and Media Failures With Offsite Storage: Symantec Online Storage for Backup Exec

    Symantec Online Storage for Backup Exec offers a hybrid approach to offsite backup storage. Using Online Storage is less expensive than offsite tape vaulting services or practices, and it delivers better protection with greater reliability. Best of all, it leverages the processes, investments and software already have in place with...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault Automatic Classification Engine Enterprise Vault 8.0

    The Automatic Classification Engine was designed for organizations that do not want to rely on users to make classification decisions or impact their productivity. ACE is an ideal solution for applying context to an organization's archived data in the form of retention and searchable policies. Items classified by these policies...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) Intelligent Archiving solutions integrate with security features already built into Active Directory, SQL, and Enterprise Vault. It will also show how to manage access to the applications securely in line with organizational preferences. This whitepaper is...

    Provided By Symantec

  • White Papers // Feb 2009

    Intelligent Archiving With Enterprise Vault 8.0

    Enterprise Vault has many options to choose from when determining an Intelligent Archiving strategy. Either from an automatic, non-user impact, perspective or through extensions to an organization's current ECM solutions, Symantec can provide a solution that can meet the organization's needs to provide context to its archived data. With the...

    Provided By Symantec

  • White Papers // Feb 2009

    Security Model for Enterprise Vault 8.0 and SQL Server

    This whitepaper discusses a large majority of the security aspects of Enterprise Vault 8.0. It discusses how it keeps information secure from unauthorized viewing and how it secures store archived data and indexes. It also discusses administrative features like Roles Based administration, Auditing, and remote administration. Other relevant topics such...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0: Archiving Lotus Domino for Storage Optimization & e-Discovery

    Whether an organization needs to archive for storage optimization, legal discovery, or both, Symantec Enterprise Vault for Domino provides a wide range of features that help it gain control over its rapidly growing messaging environment. The primary target audiences for this whitepaper are current and prospective Enterprise Vault administrators and...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for Secure Messaging 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) Secure Messaging Adapter can securely decrypt messages encrypted by RMS, PGP, and Liquid Machines Document Control. This whitepaper have also discussed the security aspects of the Enterprise Vault Adapter for Secure Messaging and Rights Management. It...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for SMTP Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and provide insight as to how to change some of the settings to be configured in line with organizational preferences. This whitepaper is intended to train...

    Provided By Symantec

  • White Papers // Feb 2009

    New Web Threats in 2009

    The new web borne threats attacking business networks are more intense and sophisticated than ever. Techniques using rich media, open source platforms, web 2.0 collaboration tools; social networking sites and a host of emerging technologies expose networks to a new breed of web security threats. This paper provides an overview...

    Provided By Symantec

  • White Papers // Feb 2009

    Veritas NetBackup for Microsoft Exchange Server Solutions Guide

    This paper describes a number of solutions for protecting and recovering Microsoft Exchange Server installations. The challenges associated with protecting a Microsoft Exchange environment, as well as multiple strategies that address them, are discussed in this paper in an easy-to-comprehend format. On completion of reading this paper, one should be...

    Provided By Symantec

  • White Papers // Feb 2009

    Ensuring Object Integrity and Recoverability Within Enterprise Content Management Systems

    ECM systems such as EMC Documentum, IBM FileNet P8, Microsoft SharePoint and Open Text Livelink help companies more effectively deal with ever-growing amounts of data. But safeguarding such systems and their complex data requires a thorough solution that not only protects the entire system against failures and disasters, but also...

    Provided By Symantec

  • White Papers // Feb 2009

    Web Based Attacks

    Technology growth on the Web has changed the way businesses and consumers communicate and interact with each other. The Web has become a staple for information sharing and commercial transactions. At the same time it has also become complex, without boundaries and immediate in its nature. A single Web page...

    Provided By Symantec

  • White Papers // Jan 2009

    Get More From Your IT Budget: Predictable Costs, Faster ROI, Better Email Security

    Managing a portfolio of IT projects is one of the most complex, costly and resource intensive activities that organizations face. In today's sluggish economy, many companies are facing IT budget cuts, which means it's essential to make every IT dollar stretch further. With a limited budget come limited resources to...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Medical Image Storage Dilemma: Why Hosted Archiving Makes Sense

    Secure storage capacity and lowering costs - do these seem like mutually exclusive propositions in the healthcare industry? Most healthcare organizations can't keep adding storage capacity to keep up with their growing medical image archive. Exponential growth in image size and volume translates into more servers, and yet space in...

    Provided By Symantec

  • White Papers // Mar 2010

    Pay-Per-Install: The New Malware Distribution Network

    Malware authoring and distribution has become very profitable over the years. Earlier, malware was written mainly for fame and notoriety. However, it has now become a very profitable enterprise, backed by a strong business model. The process of propagating and distributing malware has been evolving constantly. A few years back,...

    Provided By Symantec

  • White Papers // Nov 2009

    Zeus: King of Bots

    Zbot, also known as Zeus, is a malware package that is readily available for sale and also traded in underground forums. The package contains a builder that can generate a bot executable and Web server files (PHP, images, SQL templates) for use as the command and control server. While Zbot...

    Provided By Symantec

  • White Papers // Dec 2009

    A Museum of API Obfuscation on Win32

    Antivirus software vendors attempt to identify threats by unpacking suspicious samples and hence aim to produce as many unpackers as possible. When characteristic portions of a successfully unpacked sample are identified, the sample can be tagged and detection added. This procedure is commonly used for variants of well-known malware families...

    Provided By Symantec

  • White Papers // Nov 2009

    Inside the Jaws of Trojan.Clampi

    While Trojan.Clampi's lineage can be traced back to 2005, only variants over the last year have evolved sufficiently enough to gain more notoriety. The main purpose of Clampi is to steal online banking credentials to conduct the unauthorized transfer of funds from hacked accounts to groups likely in Eastern Europe...

    Provided By Symantec

  • White Papers // Oct 2009

    The Bredolab Files

    Trojan.Bredolab is a downloader that acts as a carrier or installer for arbitrary threats. It may download a password stealer, bot, rootkit, backdoor, or a misleading application. Some of the well-known threats it has been observed downloading include Backdoor.Rustock, Trojan.Srizbi, Trojan.Fakeavalert, and W32.Waledac. Since Bredolab installs a random mixture of...

    Provided By Symantec

  • White Papers // Aug 2009

    W32.Waledac: Threat Analysis

    W32.Waledac is a worm that uses social engineering and certain client side vulnerabilities in order to propagate. The worm has functionality to download and execute binaries, act as a network proxy, send spam, mine infected computers for data, such as email addresses and passwords, and perform Denial of Service (DoS)...

    Provided By Symantec

  • White Papers // Feb 2010

    Migrating HP Serviceguard to Veritas Cluster Server on Linux

    This paper, created with the assistance of HP, illustrates a process to migrate an HP Serviceguard for Linux (SGLX) cluster to Veritas Cluster Server (VCS). An introduction to the architecture of VCS is described including sections comparing SGLX and VCS which contrast cluster terminology and describe architecture differences. A step-by-step...

    Provided By Symantec

  • White Papers // Aug 2008

    High Availability for Databases: Protecting Oracle Databases With Veritas Cluster Server

    In years past, IT solutions were deployed to support back-end business functions such as inventory management, accounting, and human resources. In today's world, the IT solution increasingly is the business. These days the repositories for nearly all business application data are high-end database servers, and the majority of those are...

    Provided By Symantec

  • White Papers // Aug 2008

    High Availability for Mission-Critical Applications: Protecting Applications With Veritas Cluster Server

    In years past, IT solutions were deployed to support back-end business functions such as inventory management, accounting, and human resources. In today's world, the IT solution increasingly is the business. The importance of availability for services from back-end database servers, through mid-tier application servers to front-end web servers has never...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation HA for Windows From Symantec

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • Webcasts // Jan 2010

    Next Gen Threat Protection: Keep Networks and Customers Safe With Integrated Real-Time Intelligence

    Service providers, large enterprises and social networks now face more security threats than ever. 42% of IT groups cite cyber risk as their top concern - greater than natural disasters, terrorism and traditional crime combined. Spam alone now accounts for 85% of all email traffic. And 3 out of 4...

    Provided By Symantec

  • Webcasts // Jan 2010

    Maximize MS-Exchange Performance, Scale, and Compliance With Archiving

    Information management is about protecting, managing and finding unstructured information - including information in email - wherever it goes. This webcast will focus on key problems in managing information within the Microsoft Exchange eco-system including keeping Exchange data volumes at predictable levels; gaining control and eliminating PST files; finding information...

    Provided By Symantec

  • Webcasts // Jan 2010

    Optimizing Your Storage Environment With Veritas Storage Foundation

    Organizations are constantly looking to drive automation and reduce storage hardware costs while improving access to data. The attendee of this webcast learns how Veritas Storage Foundation solves these key challenges by leveraging thin provisioning, thin reclamation, solid state drives and storage tiering. Attendees will also learn how these solutions...

    Provided By Symantec

  • Webcasts // Jan 2010

    Why You Should Deduplicate Virtual Machines and Windows Applications at the Source

    The virtualization revolution continues to move through data centers, large and small. The ability to protect and manage the virtual world gets harder every day. Embracing a deduplication solution can give one back control. Deduplicating at the source will not only reduce the storage costs, but it can also free...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec Internet Security Threat Report Volume XV: Highlights and Key Trends

    The Internet threat landscape continues to change and increasingly complex and sophisticated attacks are targeting the organization's infrastructure and confidential information. This makes it even more important for the attendee to have access to global threat intelligence that can assist them in making informed decisions on how best to protect...

    Provided By Symantec

  • White Papers // Feb 2010

    Next Generation Data Protection With Symantec NetBackup 7

    Challenges to information security are on the rise with data security facing serious challenges. Protection of data is possible only once the IT infrastructure at a data center is safeguarded with the latest technology. New in the line of data security software is the Symantec NetBackup 7 that is able...

    Provided By Symantec

  • White Papers // Sep 2009

    Symantec NetBackup PureDisk: Optimizing Backups With Deduplication for Remote Offices, Data Center and Virtual Machines

    Modern endeavours find themselves faced with the issue of fast paced growing data. In fact, data growth has been predicted to be in the range of 50-60% per year. But data, instead of being confined to a single centre, is often spread across multiple data centres, remote offices and virtual...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec White Paper - 7 Steps to Windows 7

    Symantec, a provider of security, storage, and systems management solutions, suggests seven steps that ensure smooth shift and sustained business value for migration to Windows 7. It discusses efficient, cost-effective, and sustainable migration steps for Windows 7 that is productive and secure. On-demand, user-based provisioning combined with standard configurations and...

    Provided By Symantec

  • White Papers // Jan 2010

    Real-Time Data Analysis With Altiris IT Analytics and a Workflow Connector Component

    Symantec Altiris IT Analytics makes real time workflow evaluation of data a reality. This document entails a total description of IT Analytic component, how to configure and use it to suit workflow applications and make it go smoothly. With this application, it is possible to create, manage, test, change and...

    Provided By Symantec

  • White Papers // Mar 2010

    Symantec Protection Suite Add-On for Hosted Email Security

    This paper studies malware and spam as the two most harmful threats to email and IT security. While malware and spam tend to cause tremendous harm to the health and viability of IT networks, it is email security that deserves tremendous attention. This paper looks at cyber criminal attacks that...

    Provided By Symantec

  • Webcasts // Jan 2010

    Securing 2010: Perspectives From Industry Security Bloggers

    With trends such as the rise of polymorphic threats, an increase in reputation hijacking and the vast propagation of rogue security software, 2009 made a mark with its fair share of malicious activity. However, new trends in the industry offered encouragement to security administrators as the year came to a...

    Provided By Symantec

  • White Papers // Jul 2009

    Powering Linux in the Data Center

    Many IT professionals are drawn by the economy that Linux brings to the data center but are concerned about the potential risks that arise from trusting their business to "Free" software. For mission-critical enterprise data center applications, the complete line of Symantec data management and protection offerings delivers UNIX-class performance,...

    Provided By Symantec

  • White Papers // Nov 2009

    Database Storage Management With Veritas Storage Foundation by Symantec: Manageability, Availability, and Superior Performance for Databases

    Enterprises are required to manage a rapidly growing number of database-dependent applications and mission-critical database environments, often with stringent service level agreements and reduced operational budgets. The requirement for information availability has created an operational imperative to shrink database backup windows, recover more quickly from outages, and move non-critical, resource-intensive...

    Provided By Symantec

  • White Papers // Oct 2009

    7 Steps to Windows 7: Ensuring a Smooth Transition and Sustained Business Value From Your Windows 7 Migration

    Migrating to Microsoft Windows 7 can be intimidating. One wants to take advantage of new Windows 7 productivity, security, and control enhancements - but at this scale, how can one keep the migration efficient, cost-effective, and sustainable, while protecting end-user productivity? But the migration can be an opportunity as well...

    Provided By Symantec

  • White Papers // Apr 2009

    Fast Memory State Synchronization for Virtualization-Based Fault Tolerance

    Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating systems. While initial prototypes show promise virtualization-based fault-tolerant architecture still experiences substantial performance overhead especially for data-intensive workloads. The main performance challenge of virtualization-based fault...

    Provided By Symantec

  • Webcasts // Jan 2010

    Announcing Backup Exec 2010: Protect More, Store Less, Save More

    If one is like most growing companies, one is facing an increased challenge to backup all the data while keeping storage costs under control. Would one like to improve the backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Hydraq Attack Update - Ensure Your Organization Is Secure

    Hydraq (aka "Aurora") is the latest high profile security incident to hit the news. Hydraq is a targeted attack that is also currently referred to as Aurora, Google Attacks, and the Microsoft IE Vulnerability. Through the exploitation of a vulnerability, it attempts to install a trojan on a specific computer...

    Provided By Symantec

  • Webcasts // Jan 2010

    Get Leaner and More Resilient With the New Storage Foundation and Veritas Cluster Server 5.1 Release

    The attendee of this webcast learns about the recent 5.1 launch of Veritas Storage Foundation, Veritas Cluster File System and Veritas Cluster Server, Symantec's industry-leading heterogeneous storage management and high availability solutions. This webcast will cover new capabilities that will help the attendee optimize storage resources and reduce downtime: Considering...

    Provided By Symantec

  • Webcasts // Jan 2010

    Addressing the Root Causes of Inefficiency in Data

    Creating efficiency is a top concern for IT organizations - especially for mid-sized businesses that may be resource-constrained. In the wake of a tough 2009 economy and unprecedented data growth, IT organizations are seeking ways to introduce improvements that deliver time and cost savings, and drive higher service levels for...

    Provided By Symantec

  • Webcasts // Jan 2010

    Cut Storage Costs in Your Virtual World

    There's little question that virtualization is the single biggest game-changing trend in IT today. But virtualization can make information management more complex as well as increase storage consumption and costs. What can prevent one from fully realizing the promise of virtualization lies in poorly utilized or managed storage and an...

    Provided By Symantec

  • White Papers // Nov 2009

    Social Networking: Safely Manage the Paradigm Shift and Leverage Its Full Potential

    The phenomenal growth and popularity of social media websites has created promising opportunities for businesses as well as dangerous new ways for cyber-criminals to create havoc on corporate networks. This white paper from Symantec Hosted Services, written especially for IT and Security Managers, illustrates the many ways in which social...

    Provided By Symantec

  • White Papers // Oct 2009

    eDiscovery Compliance and the New Requirements of IT: The IT Manager's Guide to 100% Compliance

    Through the implementation of a strategic eDiscovery compliance program, incorporating clearly written rules, formal employee education, and a proven-effective Hosted Service Archiving Solution, US and Canadian employers can quickly and cost-effectively preserve, protect, and produce legally compliant email and other Electronically Stored Information (ESI) when compelled to do so by...

    Provided By Symantec

  • White Papers // May 2009

    Economic Stimulus Package and Health Care: Best Practices to Manage EHR and Minimize Security, Privacy and Compliance Risks

    MessageLabs Email Continuity Service helps organizations maximize email availability and guard against the disruption and data loss that can result from an email outage. Services include an on-demand Email Failover System that kicks in seamlessly when an outage occurs, allowing email users to continue sending and receiving messages through Outlook,...

    Provided By Symantec

  • White Papers // Apr 2009

    Can Heuristic Technology Help Your Company Fight Viruses?

    Electronic communication, which is an essential tool for businesses, is increasingly at risk due to the sophistication of email and web threats. Converging threats, combining viruses, spam and the web, to defraud unsuspecting victims or to disseminate malware make implementing reliable, effective protection essential for the corporate network and remote...

    Provided By Symantec

  • White Papers // Feb 2009

    Compliance Rules: Rules and Tools, Policies and Best Practices for Cost-Effective, Comprehensive Compliance in the United States

    Organizations of all types and sizes, industries and professions have long been mindful of the need for legal and regulatory compliance. In the current economic environment, however, forward-thinking organizations now are shifting their focus somewhat. Mere adherence to laws and regulations is no longer enough. Thanks to tight economic conditions...

    Provided By Symantec

  • White Papers // Feb 2009

    Top 5 Security Tips for 2009

    Email, internet usage and electronic communication are used more and more in everyday business. In fact, one could say they are an absolutely essential tool for any organization today. They've brought a whole new world of ways to save money, time and hassle - from online banking to instant messaging...

    Provided By Symantec

  • White Papers // Oct 2008

    Email Security Buyer's Guide: Software, Appliance, Managed Service?

    Email security solutions fall into three basic categories: software-based, appliance-based and managed services (also known as SaaS - Software-as-a-Service). Key weaknesses of software-based and appliance-based solutions include: difficulties in ensuring the solution stays up-to-date; major commitment of in-house IT resources; and ongoing investment in additional software/hardware etc, substantially increasing total...

    Provided By Symantec

  • White Papers // Nov 2008

    How 'DNS' Could Spell Trouble for Your Business

    Email has established itself as the world's preferred business communication tool - daily traffic now exceeds a staggering 200 billion messages. The World Wide Web too is playing an increasingly pivotal role in the way business is conducted all over the globe. So it's vital that organisations of all types...

    Provided By Symantec

  • White Papers // Nov 2009

    Singapore: A Prime Target for Cyber-Crime

    Singapore's status as a leading financial and commercial hub has made it a prime target for Internet-borne threats that are endangering businesses worldwide. 2009 has seen an unwelcome surge in spam, viruses and targeted trojans heading for corporate gateways across Singapore. The danger they pose for Singapore now significantly exceeds...

    Provided By Symantec