Symantec

Displaying 81-120 of 461 results

  • Webcasts // Jan 2012

    Orange Business Services Gets Green Light to Highly Available Services

    In this webcast, the presenter explains about Symantec data storage. The presenter also explains about solution, opens door to highly available, reliable virtualization and cloud computing strategy which is provided by integrated Symantec data storage.

    Provided By Symantec

  • Webcasts // Jan 2012

    VimpelCom Success: Data Center

    In this webcast, the presenter explains about Symantec storage management, data protection, and high availability and tells about the solutions to drive down capital and operating costs while delivering optimal services to 181-plus customers in Europe, Asia, and Africa.

    Provided By Symantec

  • Webcasts // Jan 2012

    LPI Integration & Symantec Endpoint Protection 12: Partner Thoughts

    In this webcast, the presenters explain about Symantec and its benefits. The presenters also discuss the benefits of standardizing on Symantec Endpoint Protection 12 and the value of holding the SMB Specialization.

    Provided By Symantec

  • Webcasts // Jan 2012

    A 40% Faster Backup and 40% Lower Storage Volumes With Symantec

    In this webcast, the presenter explains about Symantec Backup Exec 2012 and its benefits. The presenter explains his benefits which is accelerated backup by 40% and reduced the volume of stored data by the same amount.

    Provided By Symantec

  • Webcasts // Jan 2012

    Continental Technologies (CTI): Security and Data Protection

    In this webcast, the presenters share their facing challenges about security. The presenters also explain how works the security and storage solutions which is provided by Symantec and to help their customers with their IT needs.

    Provided By Symantec

  • Webcasts // Jan 2012

    Secure Cloud Computing - Symantec O3

    In this webcast, the presenter explains about Symantec O3. The Symantec O3 is a cloud information protection platform that provides context-based access control, information security and information management as a service for cloud applications and services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Email Spam Filter & Virus Protection Solution - Symantec.cloud

    In this webcast, the presenter asks how to keep one business safe? The presenter tells about Symantec.cloud Email Security services and its protect against email spam, viruses, phishing and other email threats via the cloud.

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • Webcasts // Jan 2012

    Symantec Data Loss Prevention for Mobile

    In this webcast, the presenter shares his enterprises need to protect confidential data wherever it resides - even on tablet computers like the iPad. The presenter also the uses of Symantec Data Loss Prevention for Mobile.

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • White Papers // Dec 2011

    A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

    Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...

    Provided By Symantec

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security.

    As use of the Internet has become increasingly commonplace and crucial to a wide range of applications, criminals have found an ever-growing group of people they can target. Apart from hurting users, this activity is detrimental to the brand of the real site being spoofed. Without trust, no website or...

    Provided By Symantec

  • White Papers // Nov 2011

    Key eDiscovery Issues to Consider in 2011

    This white paper discusses the threats that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. It uses research from recent Osterman Research surveys, as well as information from a variety of other data sources to illustrate how to address and overcome security gaps.

    Provided By Symantec

  • White Papers // Nov 2011

    Guide to social media use in your business

    Are you on Twitter, Facebook or Google+? Even if you're not, you should know about social networking's benefits and risks for business. There's no doubt social networking is becoming almost ubiquitous, but CIOs and IT managers aren't necessarily keen on it. Social networking can have business benefits, but it brings...

    Provided By Symantec

  • White Papers // Oct 2011

    Protecting the enterprise: Best practice for information security

    Keeping a connected enterprise secure requires both proactive and reactive approaches. The number of threats from cybercriminals -- malware, insider data breaches and even cyber-espionage -- is growing, so organisations should have consistent and unified barriers in place to prevent attacks and protect the business against them. This best practice...

    Provided By Symantec

  • White Papers // Sep 2011

    Business benefits of email archiving

    The burdens of email do not have to outweigh its uses. Email archiving is an essential business tool, and the benefits can go far beyond the realm of the IT department. It is more than regulatory compliance; it is a strategic tool for productivity, long-term information storage, discovery, retrieval and...

    Provided By Symantec

  • White Papers // Sep 2011

    Internet security in the age of roaming users

    The whole concept of business - how it's done, when it's done, where it's done - is changing radically, and the legions of mobile workers are leading the change. While cloud computing benefits businesses by allowing employees to work remotely, this model also introduces a host of new security risks....

    Provided By Symantec

  • White Papers // Sep 2011

    Email, archiving and productivity

    Is your email system holding back your business? While email has become an indispensible technology, it presents a new set of issues for businesses, from storage demands to increased IT requests to searching difficulties. Companies looking to solve these problems are increasingly looking at hosted email archiving solutions, a centralised...

    Provided By Symantec

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • Webcasts // Apr 2011

    Defeating the Cyber Mutants: Protecting Your Business from Modern Malware

    Modern malware rarely strikes the same way twice. Today's malicious code rapidly mutates, bypassing traditional defences. This webcast will examine these threats and the new technology that organizations from small businesses to large enterprises can use to protect their physical and virtual environments. Attend this webcast to learn: Why traditional...

    Provided By Symantec

  • Webcasts // Mar 2011

    Symantec Study: SMBs Not Prepared For Disasters, Don't Act Until It's Too Late

    Symantec's 2011 SMB Disaster Preparedness Survey found that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also revealed that disaster-related downtime costs a typical SMB $12,500 per day. Learn more about the survey findings...

    Provided By Symantec

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • Webcasts // Feb 2011

    Small Businesses: Protect Your Sensitive Information from the Latest Security Threats

    FFind out about the latest attack toolkits and other threats that can compromise your small business data. Attendees will be able to walk away from the webcast with a greater sense of the small business security landscape, and what they can do to protect their proprietary information, including financial and...

    Provided By Symantec

  • White Papers // Jan 2011

    Demystifying Virtualization for Small Businesses

    Virtualization is not new. Most businesses have heard about it and the rate of adoption has been growing rapidly for years. In fact, analysts predict the adoption rate of virtualization among small to medium-sized businesses will double in the next two years, making virtualization technology relatively mainstream. There are different...

    Provided By Symantec

  • Webcasts // Jan 2011

    Norton Secured Seal Powered by VeriSign: Partner Thoughts

    In this webcast, the presenter explains about Verisign. The presenter also discusses about the transition of VeriSign SSL (Secure Sockets Layer) to Norton Secured Seal Powered by VeriSign. The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission over the Internet.

    Provided By Symantec

  • Webcasts // Nov 2010

    Webcast: Smart Route to Windows 7

    Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process. During this 30 minute...

    Provided By Symantec

  • White Papers // Oct 2010

    Reputation-Based Security an Analysis of Real World Effectiveness

    In September of 2009, Symantec released its first reputation based security offering as a part of its consumer security products. They have given us insight into the types of threats that can be effectively detected using a reputation system and they have helped us to understand how to adjust the...

    Provided By Symantec

  • White Papers // Oct 2010

    W32.Stuxnet Dossier

    W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats the author have analyzed. In this paper the author take a detailed look at Stuxnet and its various components and particularly focus on the...

    Provided By Symantec

  • White Papers // Sep 2010

    The Risks of Social Networking

    Social networks are an inherent part of today's Internet and used by more than a billion people worldwide. They allow people to share ideas and interact with other people, from old friends to strangers. This interaction reveals a lot of information, often including personal information visible to anyone who wants...

    Provided By Symantec

  • White Papers // Sep 2010

    The Rise of PDF Malware

    The PDF file format has become a popular file format since its release as an open standard. Its portable nature, extensive feature list, and availability of free tools to read and author them have made it a de facto standard for printable documents on the Web. As it gained more...

    Provided By Symantec

  • Case Studies // Aug 2010

    Legal Aid Center of Southern Nevada: Restoring Justice and Data Faster With Symantec and Kortek Solutions

    With 18,000 clients in the past year and demand growing, Legal Aid Center of Southern Nevada provides free legal advice and representation to low-income residents who can't afford an attorney. With a spike in the state's population growth and 11.2 percent of Southern Nevadans below the poverty line, these services...

    Provided By Symantec

  • White Papers // Jun 2010

    Symantec is Windows 7 Migration

    By the end of 2010, almost 20 percent of the global IT workforce will be running Microsoft Windows 71 - taking advantage of productivity and connectivity features that promise to make it the world's preferred business operating system. Like any large-scale IT transformation, Windows 7 migration presents its share of...

    Provided By Symantec

  • White Papers // May 2010

    Symantec Intelligence Quarterly

    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. More than 240,000 sensors in over 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec Deep Sight Threat Management...

    Provided By Symantec

  • Case Studies // Apr 2010

    Symantec Case Study: Noel Leeming Group Limited

    With over 90 retail stores across New Zealand, Noel Leeming Group's success is built on its technology expertise and superior customer service. They wanted centralized IT team servicing decentralized users also In-house software incorrectly delaying genuine business emails. To master these challenges they turned MessageLab. MessageLabs Hosted Email AntiSpam, AntiVirus...

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Provided By Symantec

  • White Papers // Dec 2011

    A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

    Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Provided By Symantec

  • White Papers // Oct 2012

    Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance

    Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Your Website With Always On SSL

    Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Android Applications

    Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.

    Provided By Symantec

  • White Papers // Oct 2012

    Code Signing for Adobe AIR

    Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.

    Provided By Symantec

  • White Papers // Oct 2012

    The Essential Series: Code Signing Certificates

    Download this white paper, The Essential Series: Code Signing Certificates, and learn about the many ways in which code signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.

    Provided By Symantec

  • White Papers // Oct 2012

    To Increase Downloads, Instill Trust First

    Download this FREE white paper - To Increase Downloads, Instill Trust First - to learn how to increase downloads on your site with code signing.

    Provided By Symantec

  • White Papers // Oct 2012

    Protect your Brand against Today's Malware Threats with Code Signing

    Download this guide - Protect your Brand against Today's Malware Threats with Code Signing - to learn about malware threats, the impact they can have on your business and how to protect your company and customers by using code signing.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing the Mobile App Market

    To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Software for the Mobile Application Market: The Latest Code Signing Technology

    Download this white paper, Securing Your Software for Mobile Application Market: The Latest Code Signing Technology, to learn about how the latest Code Signing technology works to secure software code and content for applications that are directly downloaded onto mobile devices from the Internet.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Private Keys as Best Practice for Code Signing Certificates

    Securing Your Private Keys as Best Practice for Code Signing Certificates Download this guide, Securing Your Private Keys as Best Practice for Code Signing Certificates to learn how to safeguard your code signing private keys from increasingly, extremely sophisticated malware attacks, such as Stuxnet.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Jun 2012

    Legal Compliance in Electronic Record Keeping

    Legislation dictates that companies must ensure the secure retention of records and information with emails making up a significant amount of such "records". Regulated retention is a major issue for non-government organizations. This paper outlines the key points that you need to ensure your company is dispute ready with proper...

    Provided By Symantec

  • White Papers // Nov 2012

    Exploiting the business potential of BYOD

    The way we do business is changing. The trend for employees to use personal mobile devices at work is on the increase. Organisations have to weigh up the productivity benefits this brings against the major security challenges it incurs. This paper will consider the implications of mobile computing within the...

    Provided By Symantec

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • White Papers // Nov 2011

    Key eDiscovery Issues to Consider in 2011

    This white paper discusses the threats that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. It uses research from recent Osterman Research surveys, as well as information from a variety of other data sources to illustrate how to address and overcome security gaps.

    Provided By Symantec

  • White Papers // May 2007

    Symantec Enterprise Vault: File System Archiving

    For more than 25 years, organizations have been attracted to the idea of providing different storage layers according to the relevance of data, an approach referred to as Hierarchical Storage Management (HSM). Today, however, companies accumulate an enormous amount of information, presenting new challenges. In addition to simply storing the...

    Provided By Symantec

  • Webcasts // May 2007

    VCS for VMware ESX: The Only Comprehensive HA/DR Solution for the VMware Environment

    Companies have achieved higher utilization and lower hardware costs through server virtualization and consolidation. However, placing multiple applications on one server increases the impact of a human, software, or machine error. Where hardware failure may have impacted a single application, with virtualization, many applications may be affected. To mitigate this...

    Provided By Symantec

  • White Papers // Nov 2007

    Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies

    Veritas NetBackup 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage...

    Provided By Symantec

  • Webcasts // Jun 2008

    Symantec Endpoint Protection 11.0 - Benefits of Upgrading

    This webcast will present the benefits of upgrading to Symantec Endpoint Protection 11.0. Symantec Endpoint Protection threat prevention technologies present users with the optimum balance between security needs, administrative overhead and system impact. The webcast will focus on the advantages of the Symantec Endpoint Protection 11.0 management architecture, the required...

    Provided By Symantec

  • White Papers // Dec 2008

    Best Practices for Using Symantec Online Storage for Backup Exec

    Symantec Backup Exec for Windows Servers is a comprehensive backup and recovery solution that protects a wide range of data resources, from file systems to popular databases. Symantec online Storage enhances Backup Exec by providing secure off-site backup storage hosted in redundant data centers that are managed by Symantec for...

    Provided By Symantec

  • Webcasts // Feb 2009

    Top 7 Backup Mistakes to Avoid in Windows Environment

    There are several common backup/restore mistakes that could be costing the money and even putting the business data at risk. The attendee will learn how Backup Exec for Windows 12.5 and Backup Exec System Recovery 8.5 can help to avoid these common backup mistakes in Windows environments.

    Provided By Symantec

  • Webcasts // Feb 2009

    Small Business Backup: Your Data May Not Be as Protected as You Think

    The loss of critical data can be crippling to any business, still many small and mid-size companies do not adequately backup their data. An independent study conducted, reveals the pitfalls of poorly implemented backup strategies - and the real world consequences of unexpected data loss. This new study illuminates the...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Managing Business Risks From the Use of IT

    The presenter of this webcast focuses on the relationship between business risks and use of IT. The presenter of this webcast throws light on key business risks from the use of IT, financial outcomes and self-insurance thresholds and outcomes by industry and size of organization.

    Provided By Symantec

  • Webcasts // Jan 2009

    Complete Protection of Your Virtual World: Award Winning Backup and Recovery With NetBackup 6.5

    NetBackup for VMware is the most integrated VMware backup solution on the market today. The attendee will experience just how NetBackup delivers the industry first granular recovery capability from a single image level backup. In combination with VMware Consolidated Backup (VCB), NetBackup for VMware delivers both the backup performance and...

    Provided By Symantec