Symantec

Displaying 121 - 130 of 226 results

  • Vulnerability Assessment

    White Papers // Jan 2014 // provided by Symantec

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply ...

    Download Now
  • Website Security Threat Report 2013

    White Papers // Jan 2014 // provided by Symantec

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media ...

    Download Now
  • The Power to Destroy: How Malware Works

    White Papers // Jan 2014 // provided by Symantec

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data ...

    Download Now
  • The Evolution and Value of Purpose-Built Backup Appliances

    White Papers // Oct 2013 // provided by Symantec

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper ...

    Download Now
  • Symantec Internet Security Threat Report 2014

    White Papers // Oct 2013 // provided by Symantec

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media ...

    Download Now
  • Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    White Papers // Oct 2013 // provided by Symantec

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for ...

    Download Now
  • Cost of Data Breach Study -Italy 2013

    Case Studies // Sep 2013 // provided by Symantec

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Download Now
  • What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    White Papers // Sep 2013 // provided by Symantec

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive ...

    Download Now
  • Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    White Papers // Apr 2013 // provided by Symantec

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live ...

    Download Now
  • Good for security, good for business

    White Papers // Apr 2013 // provided by Symantec

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?