Symantec

Displaying 81-120 of 317 results

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Provided By Symantec

  • White Papers // Oct 2012

    Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance

    Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Your Website With Always On SSL

    Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...

    Provided By Symantec

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Android Applications

    Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.

    Provided By Symantec

  • White Papers // Oct 2012

    Protect your Brand against Today's Malware Threats with Code Signing

    Download this guide - Protect your Brand against Today's Malware Threats with Code Signing - to learn about malware threats, the impact they can have on your business and how to protect your company and customers by using code signing.

    Provided By Symantec

  • White Papers // Oct 2012

    To Increase Downloads, Instill Trust First

    Download this FREE white paper - To Increase Downloads, Instill Trust First - to learn how to increase downloads on your site with code signing.

    Provided By Symantec

  • White Papers // Oct 2012

    The Essential Series: Code Signing Certificates

    Download this white paper, The Essential Series: Code Signing Certificates, and learn about the many ways in which code signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.

    Provided By Symantec

  • White Papers // Oct 2012

    Code Signing for Adobe AIR

    Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Private Keys as Best Practice for Code Signing Certificates

    Securing Your Private Keys as Best Practice for Code Signing Certificates Download this guide, Securing Your Private Keys as Best Practice for Code Signing Certificates to learn how to safeguard your code signing private keys from increasingly, extremely sophisticated malware attacks, such as Stuxnet.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Software for the Mobile Application Market: The Latest Code Signing Technology

    Download this white paper, Securing Your Software for Mobile Application Market: The Latest Code Signing Technology, to learn about how the latest Code Signing technology works to secure software code and content for applications that are directly downloaded onto mobile devices from the Internet.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing the Mobile App Market

    To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.

    Provided By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.

    Provided By Symantec

  • White Papers // Oct 2012

    Best Practices and Applications of TLS (Transport Layer Security)/SSL

    Download Best Practices and Applications of TLS (Transport Layer Security)/SSL to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.

    Provided By Symantec

  • White Papers // Oct 2012

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Download Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust to learn how businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.

    Provided By Symantec

  • White Papers // Oct 2012

    Backup administrators speak out

    In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...

    Provided By Symantec

  • White Papers // Oct 2012

    Backup administrators speak out

    In too many organizations, piecemeal data-backup solutions create undue complexity and cost. The state of backup is broken, as Dave Russell of Gartner has stated. This Symantec white paper addresses comprehensive data backup, managed from a single platform. A backup platform is akin to a "manager of managers", which means...

    Provided By Symantec

  • White Papers // Jun 2012

    Legal Compliance in Electronic Record Keeping

    Legislation dictates that companies must ensure the secure retention of records and information with emails making up a significant amount of such "records". Regulated retention is a major issue for non-government organizations. This paper outlines the key points that you need to ensure your company is dispute ready with proper...

    Provided By Symantec

  • White Papers // Apr 2012

    Malware threat landscape 2012: How to defend your business

    Every time you or one of your employees connects to the Internet, your organisation is at risk of infection by malware. Some methods of connection are safer than others, but the main vectors of a malware attack are the tools most employees and customers use every day: web browsing and...

    Provided By Symantec

  • Webcasts // Jan 2012

    Secure Cloud Computing - Symantec O3

    In this webcast, the presenter explains about Symantec O3. The Symantec O3 is a cloud information protection platform that provides context-based access control, information security and information management as a service for cloud applications and services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Continental Technologies (CTI): Security and Data Protection

    In this webcast, the presenters share their facing challenges about security. The presenters also explain how works the security and storage solutions which is provided by Symantec and to help their customers with their IT needs.

    Provided By Symantec

  • Webcasts // Jan 2012

    A 40% Faster Backup and 40% Lower Storage Volumes With Symantec

    In this webcast, the presenter explains about Symantec Backup Exec 2012 and its benefits. The presenter explains his benefits which is accelerated backup by 40% and reduced the volume of stored data by the same amount.

    Provided By Symantec

  • Webcasts // Jan 2012

    LPI Integration & Symantec Endpoint Protection 12: Partner Thoughts

    In this webcast, the presenters explain about Symantec and its benefits. The presenters also discuss the benefits of standardizing on Symantec Endpoint Protection 12 and the value of holding the SMB Specialization.

    Provided By Symantec

  • Webcasts // Jan 2012

    VimpelCom Success: Data Center

    In this webcast, the presenter explains about Symantec storage management, data protection, and high availability and tells about the solutions to drive down capital and operating costs while delivering optimal services to 181-plus customers in Europe, Asia, and Africa.

    Provided By Symantec

  • Webcasts // Jan 2012

    Orange Business Services Gets Green Light to Highly Available Services

    In this webcast, the presenter explains about Symantec data storage. The presenter also explains about solution, opens door to highly available, reliable virtualization and cloud computing strategy which is provided by integrated Symantec data storage.

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability for Linux

    In this webcast, the presenter explains about how standardization and a single, powerful set of tools that span operating systems and storage infrastructures can provide a foundation for standardized backup, disaster recovery and other data management and protection services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability Products on Solaris

    In this webcast, the presenter explains about using Veritas Storage Foundation and high availability products in a Solaris environment, including the importance of standardization, moving to clustered file systems, and workload performance.

    Provided By Symantec

  • Webcasts // Jan 2012

    Virtualize With Confidence in Hyper-V Environments

    In this webcast, the presenter discusses advantages for Hyper-V environments gained from Live Storage Migration and Wide Area Disaster Recovery features in Veritas Storage Foundation and High Availability for Windows 6.0.

    Provided By Symantec

  • Webcasts // Jan 2012

    Improve Service Levels and Reduce Cost With Storage Foundation Manager

    In this webcast, the presenter discusses why Storage Foundation Manager is a must have for Data Center Environments running Storage Foundation and High Availability software to dramatically improve service levels while reducing cost.

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • Webcasts // Sep 2009

    Reduce Costs With Good Systems Management Practices in Hard Economic Times

    As budgets are being slashed, IT is still expected to do more with less to support the business. With good systems management practices in place using products from Symantec such as Altiris Client Management Suite, IT professionals can reduce overall costs of owning PCs throughout their organization. This webcast will...

    Provided By Symantec

  • Webcasts // Sep 2009

    Manage and Secure Your Mobile Devices Efficiently

    The attendee of this webcast will learn how Symantec makes it easy to manage and secure mobile devices efficiently. A priority for IT organizations is to efficiently secure all their endpoints and gain confidence that corporate assets and business operations are protected and updated - all while controlling costs. After...

    Provided By Symantec

  • Webcasts // Sep 2009

    Prevent Security Breaches by Protecting Information Proactively

    Which organizations want to be in the news because of a security breach? Threats to corporate information continue to increase and IT organizations now have to worry about internal and external attack vectors - including employees who may either intentionally or accidentally risk critical information. Loss of this critical information...

    Provided By Symantec

  • Webcasts // Aug 2009

    Automating Server Management Processes With Workflow

    This webcast will discuss the benefits of automation, or workflow, within an IT department to help reduce the time that administrators spend on mundane, repetitive and manual tasks. The webcast will highlight the Altiris Workflow Solution and give several real-world examples of how server focused IT processes can be automated...

    Provided By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Provided By Symantec

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Provided By Symantec

  • White Papers // Dec 2011

    A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

    Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...

    Provided By Symantec

  • White Papers // Oct 2012

    Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance

    Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Your Website With Always On SSL

    Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...

    Provided By Symantec

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Android Applications

    Download Protecting Android Applications with Secure Code Signing Certificates and learn the value of secure code signing practices for building more secure Android apps as well as how these certificates play a key role in helping developers enhance the safety of their applications, their users, and their reputations.

    Provided By Symantec

  • Webcasts // Dec 2009

    Automate Your Security Awareness Training

    Research shows that the single most important cause of data breaches is the inadvertent violation of basic information security precautions by well-meaning employees. Whether it is storing confidential data unencrypted on a removable device that may be lost or stolen - or simply sharing proprietary information in a crowded elevator...

    Provided By Symantec

  • White Papers // Oct 2012

    Protect your Brand against Today's Malware Threats with Code Signing

    Download this guide - Protect your Brand against Today's Malware Threats with Code Signing - to learn about malware threats, the impact they can have on your business and how to protect your company and customers by using code signing.

    Provided By Symantec

  • White Papers // Oct 2012

    To Increase Downloads, Instill Trust First

    Download this FREE white paper - To Increase Downloads, Instill Trust First - to learn how to increase downloads on your site with code signing.

    Provided By Symantec

  • White Papers // Oct 2012

    The Essential Series: Code Signing Certificates

    Download this white paper, The Essential Series: Code Signing Certificates, and learn about the many ways in which code signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.

    Provided By Symantec

  • White Papers // Oct 2012

    Code Signing for Adobe AIR

    Download this FREE white paper - Code Signing for Adobe Air - and learn how Code Signing helps you build trusted relationships with your software users.

    Provided By Symantec

  • Webcasts // Dec 2009

    Optimize Your Storage - Storage Resource Management in VMware Environments With Veritas CommandCentral

    With physical storage now separated by two or more degrees from the logical storage an application consumes, traditional storage management approaches are no longer valid. The task of understanding and optimizing resources that applications depend on - which now traverses the virtualization layer - can be a daunting one for...

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Private Keys as Best Practice for Code Signing Certificates

    Securing Your Private Keys as Best Practice for Code Signing Certificates Download this guide, Securing Your Private Keys as Best Practice for Code Signing Certificates to learn how to safeguard your code signing private keys from increasingly, extremely sophisticated malware attacks, such as Stuxnet.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing Your Software for the Mobile Application Market: The Latest Code Signing Technology

    Download this white paper, Securing Your Software for Mobile Application Market: The Latest Code Signing Technology, to learn about how the latest Code Signing technology works to secure software code and content for applications that are directly downloaded onto mobile devices from the Internet.

    Provided By Symantec

  • White Papers // Oct 2012

    Securing the Mobile App Market

    To learn more about how code signing mitigates security risks unique to mobile applications and helps build trust across the mobile computing eco-system, download this white paper, Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development now.

    Provided By Symantec

  • Webcasts // Dec 2009

    Storage Management and Backup & Recovery: Best Practices for Microsoft Hyper-V Environments

    Virtualization introduces new requirements that affect IT business continuity such as backup, disaster recovery, and storage management. Ensuring rapid and reliable application and data recovery while controlling storage growth can be challenging as virtualization creates a whole new set of complexities. Symantec integrates with the leading virtualization platforms, including Microsoft...

    Provided By Symantec

  • Webcasts // Dec 2009

    Backup and Recover Your VMware and Hyper-V Machines in Seconds

    Whether considering implementing a virtual environment or are already experiencing the benefits of virtualization, backing up and recovering the guest machines, files and folders in a virtual environment is a new challenge one have to solve. Symantec Backup Exec 12.5 allows companies to save time and cost associated with data...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec

  • White Papers // Oct 2012

    Beginner's Guide to SSL Certificates

    Download Beginners Guide to SSL Certificates: Making the Best Choice when Considering Your Online Security Options to learn how VeriSign SSL Certificates offer SSL protection and more--all in a single solution.

    Provided By Symantec