Symantec

Displaying 121 - 130 of 226 results

  • The Truth About Online Trust

    White Papers // Jan 2014 // provided by Symantec

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity ...

    Download Now
  • Phishing – The latest tactics and potential business impacts

    White Papers // Jan 2014 // provided by Symantec

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously ...

    Download Now
  • Vulnerability Assessment

    White Papers // Jan 2014 // provided by Symantec

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply ...

    Download Now
  • Website Security Threat Report 2013

    White Papers // Jan 2014 // provided by Symantec

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media ...

    Download Now
  • The Power to Destroy: How Malware Works

    White Papers // Jan 2014 // provided by Symantec

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data ...

    Download Now
  • The Evolution and Value of Purpose-Built Backup Appliances

    White Papers // Oct 2013 // provided by Symantec

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper ...

    Download Now
  • Symantec Internet Security Threat Report 2014

    White Papers // Oct 2013 // provided by Symantec

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media ...

    Download Now
  • Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    White Papers // Oct 2013 // provided by Symantec

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for ...

    Download Now
  • Cost of Data Breach Study -Italy 2013

    Case Studies // Sep 2013 // provided by Symantec

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Download Now
  • What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    White Papers // Sep 2013 // provided by Symantec

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive ...

    Download Now