Symantec

Displaying 401-416 of 416 results

  • White Papers // Jan 2009

    The Value of Security Suites

    While the recent shutdown of systems hosted by McColo was a milestone in the war against spam, the shutdown was little more than a short-term obstacle for spammers. As the threat landscape continues to evolve, small and midsize businesses need to stay vigilant and informed. By gaining a greater awareness...

    Provided By Symantec

  • White Papers // Jan 2009

    Best Practice for NDMP Backup Veritas NetBackup

    Many customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their Network Attached Storage (NAS) servers. Most NAS vendors and data protection providers (such as Symantec) have multiple options for protecting the NAS environment. This paper will help to make sense...

    Provided By Symantec

  • Webcasts // Jan 2009

    Spam, Botnets and Spyware - An Overview of the Current Threat Landscape

    The presenter of this webcast will discuss what to look out for next in terms of spam attacks against the network. With a consistently evolving threat landscape, it becomes imperative to stay aware of the latest risks that the company faces. The presenter will cover the latest threats from a...

    Provided By Symantec

  • White Papers // Jan 2009

    Choosing a Cost-Effective Email Security Solution: In Turbulent Economic Times

    Managing a portfolio of IT projects is one of the most complex, costly and resource intensive activities that organizations face. In today's sluggish economy, many companies are facing IT budget cuts, which means it's essential to make every IT dollar stretch further. With a limited budget come limited resources to...

    Provided By Symantec

  • Webcasts // Jan 2009

    Are Spyware and Phishing Secretly Compromising Your Network?

    Spyware and phishing are quickly becoming the most costly online threats for organizations across all industries. In fact, by 2010, 70% of all IT security incidents will be spyware-related. By using a managed service, the organization will no longer need to worry about malicious attacks infiltrating the network. By stopping...

    Provided By Symantec

  • White Papers // Jan 2009

    IT Budget Strategy in a Down Economy: Stop Buying Storage!

    The current recessionary economic cycle has introduced a great deal of uncertainty into the business climate. Organizations are reluctant to spend any more money than absolutely necessary, which has limited or delayed the acquisition of IT equipment that otherwise, might have been routine. Forecasts vary widely for the depth and...

    Provided By Symantec

  • Resource Center // Jan 2009

    Symantec Backup Exec Challenge

    Symantec invites you to take the Backup Exec? Challenge. Answer six questions to receive an analysis of how your current backup solution compares to Symantec Backup Exec 12.5 and Symantec Backup Exec System Recovery 8.5.

    Provided By Symantec

  • White Papers // Jan 2009

    Backing Up VMware With Veritas NetBackup

    Linux has become the operating system of choice for a broad community of software and hardware vendors. All over the world, thousands of developers and end users of standards based systems choose Linux because of the open collaboration that occurs. The governance model for Linux is - unlike Solaris 10...

    Provided By Symantec

  • White Papers // Dec 2008

    NetBackup Architecture Overview

    The purpose of this paper is to provide an overview of the requirements for a basic NetBackup architecture to help customers understand which components are required in a data protection solution. Where possible, an example of a component will be noted; however, that component could be swapped for a similar...

    Provided By Symantec

  • Webcasts // Sep 2008

    Learn How Symantec Business Critical Services (BCS) Can Minimize Downtime and Ensure You Receive Maximum Value From Your Symantec Investment

    The attendee of this webcast will learn more about how Business Critical Services was designed for enterprises such as that have minimal tolerance for service interruptions. The attendee will also learn about the range of options available; from the highest levels of responsiveness to personalized and proactive services that are...

    Provided By Symantec

  • Webcasts // Jul 2008

    IT Analytics for Symantec Endpoint Protection - Uncover New Ways to More Effectively Manage and Secure Your Environment

    The attendee will learn how the new IT Analytics Symantec Endpoint Protection Pack will provide enhanced visibility into the health of the environment, allowing to make strategic decisions to combat potential security threats. The IT Analytics Symantec Endpoint Protection Pack is an advanced reporting solution that leverages business intelligence capabilities...

    Provided By Symantec

  • Webcasts // Jun 2008

    Symantec Endpoint Protection 11.0 - Benefits of Upgrading

    This webcast will present the benefits of upgrading to Symantec Endpoint Protection 11.0. Symantec Endpoint Protection threat prevention technologies present users with the optimum balance between security needs, administrative overhead and system impact. The webcast will focus on the advantages of the Symantec Endpoint Protection 11.0 management architecture, the required...

    Provided By Symantec

  • Downloads // Jun 2008

    Symantec Backup Exec System Recovery Server Edition

    Symantec Backup Exec System Recovery 8 restores systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. Backup Exec System Recovery 8 now includes: flexible offsite protection to an FTP location or secondary disk; granular recovery of Microsoft Exchange and SharePoint documents or files and...

    Provided By Symantec

  • White Papers // Nov 2007

    Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies

    Veritas NetBackup 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage...

    Provided By Symantec

  • Webcasts // May 2007

    VCS for VMware ESX: The Only Comprehensive HA/DR Solution for the VMware Environment

    Companies have achieved higher utilization and lower hardware costs through server virtualization and consolidation. However, placing multiple applications on one server increases the impact of a human, software, or machine error. Where hardware failure may have impacted a single application, with virtualization, many applications may be affected. To mitigate this...

    Provided By Symantec

  • White Papers // May 2007

    Symantec Enterprise Vault: File System Archiving

    For more than 25 years, organizations have been attracted to the idea of providing different storage layers according to the relevance of data, an approach referred to as Hierarchical Storage Management (HSM). Today, however, companies accumulate an enormous amount of information, presenting new challenges. In addition to simply storing the...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec NetBackup 7

    The new release of Symantec NetBackup 7 is redefining best-in-class enterprise data protection with advanced technology features that help customers tackle some of the major information management challenges facing today's enterprise IT environments - from the data center to global and remote offices: uncontrolled backup storage growth.

    Provided By Symantec

  • Webcasts // Jun 2009

    How and Why You Need to Protect Your Small Business

    How completely is small business environment protected from today's complex malware, data loss and spam threats? How can one have confidence that the assets are continuously protected while focusing on running the business? Symantec Protection Suite Small Business Edition is an easy to use, "All-in-one" suite that protects critical business...

    Provided By Symantec

  • White Papers // Apr 2009

    Veritas CommandCentral - Supporting the Virtual Enterprise

    Veritas CommandCentral is an enterprise storage management solution that provides the ability to manage storage effectively not only in the physical environment, but in the virtual environment as well. As organizations evaluate different physical and virtual solutions, it is imperative to consider the management implications of server and storage virtualization....

    Provided By Symantec

  • Webcasts // Jan 2010

    Protect More, Store Less by Upgrading to Symantec Backup Exec 2010

    If one likes most growing companies, one is facing an increased challenge to backup all their data while keeping storage costs under control. How can one improve the Backup Exec backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Webcasts // Jan 2010

    Overview on the Latest Deduplication Solution by Symantec, NetBackup 5000

    Symantec understands the shifting needs of the data center and has now launched a new deduplication appliance, NetBackup 5000, as an additional option for customers to leverage with their backup strategy and to help maintain information growth within their environment. NetBackup 5000 simplifies the deployment of deduplication to existing NetBackup...

    Provided By Symantec

  • Webcasts // Jun 2009

    Discover How Mid-Size Organizations Effectively Secure Their Environments With the New Symantec Protection Suite

    How completely is the environment protected from today's complex malware, data loss, and spam threats? The presenter of this webcast discusses challenges faced by mid-sized organizations and how Symantec's newest security suite, Symantec Protection Suite Enterprise Edition, can help one address those challenges. Symantec Protection Suite Enterprise Edition creates a...

    Provided By Symantec

  • White Papers // Feb 2009

    Start Thin, Get Thin, and Stay Thin With Thin Provisioning Technology From Symantec and 3PAR

    This white paper discusses the fundamental problem that thin provisioning was designed to address - that of allocated-but-unused storage. It explains the concepts behind thin provisioning and describes key benefits in detail. It examines 3PAR Thin Provisioning software and also discusses how, for applications already deployed on legacy storage, IT...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec Brightmail Gateway v8.0

    The ongoing issue facing messaging administrators is how to preserve the value of messaging in light of escalating security threats and compliance requirements. Organizations are seeing an increased need for integrated secure content and threat management solutions that address multiple threats in a single solution. The Symantec Brightmail Gateway (Brightmail...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec Internet Security Threat Report Volume XV: Highlights and Key Trends

    The Internet threat landscape continues to change and increasingly complex and sophisticated attacks are targeting the organization's infrastructure and confidential information. This makes it even more important for the attendee to have access to global threat intelligence that can assist them in making informed decisions on how best to protect...

    Provided By Symantec

  • Webcasts // Jun 2009

    Symantec Workflow and Security Responses

    One of the employees looses a laptop or "Accidentally" copies critical data to a USB drive before they leave the building. Perhaps there is a virus outbreak and one needs to get the critical patch out to the endpoints. What is the process for responding to these security threats and...

    Provided By Symantec

  • White Papers // Jul 2009

    Stealthy Deployment and Execution of In-Guest Kernel Agents

    As more and more Virtual Machines (VM) are packed into a physical machine, refactoring common kernel components shared by virtual machines running on the same physical machine could significantly reduce the overall resource consumption. The refactored kernel component typically runs on a special VM called a virtual appliance. Because of...

    Provided By Symantec

  • Webcasts // Jan 2009

    ING Renault F1 Team Takes 1st Place with Symantec Enterprise Vault and NetApp

    View this Webcast to hear why and how joint customer Renault Formula 1 implemented Symantec Enterprise Vault (EV) and NetApp storage for email archival and discovery for over 400,000 messages a week! Organizations are challenged to manage the growth of their unstructured information within email, file systems, SharePoint, and...

    Provided By Symantec

  • White Papers // Apr 2012

    Malware threat landscape 2012: How to defend your business

    Every time you or one of your employees connects to the Internet, your organisation is at risk of infection by malware. Some methods of connection are safer than others, but the main vectors of a malware attack are the tools most employees and customers use every day: web browsing and...

    Provided By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec