Symantec

Displaying 121-160 of 419 results

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • Webcasts // Apr 2011

    Defeating the Cyber Mutants: Protecting Your Business from Modern Malware

    Modern malware rarely strikes the same way twice. Today's malicious code rapidly mutates, bypassing traditional defences. This webcast will examine these threats and the new technology that organizations from small businesses to large enterprises can use to protect their physical and virtual environments. Attend this webcast to learn: Why traditional...

    Provided By Symantec

  • Webcasts // Mar 2011

    Symantec Study: SMBs Not Prepared For Disasters, Don't Act Until It's Too Late

    Symantec's 2011 SMB Disaster Preparedness Survey found that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also revealed that disaster-related downtime costs a typical SMB $12,500 per day. Learn more about the survey findings...

    Provided By Symantec

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • Webcasts // Feb 2011

    Small Businesses: Protect Your Sensitive Information from the Latest Security Threats

    FFind out about the latest attack toolkits and other threats that can compromise your small business data. Attendees will be able to walk away from the webcast with a greater sense of the small business security landscape, and what they can do to protect their proprietary information, including financial and...

    Provided By Symantec

  • Webcasts // Jan 2011

    Norton Secured Seal Powered by VeriSign: Partner Thoughts

    In this webcast, the presenter explains about Verisign. The presenter also discusses about the transition of VeriSign SSL (Secure Sockets Layer) to Norton Secured Seal Powered by VeriSign. The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission over the Internet.

    Provided By Symantec

  • White Papers // Jan 2011

    Demystifying Virtualization for Small Businesses

    Virtualization is not new. Most businesses have heard about it and the rate of adoption has been growing rapidly for years. In fact, analysts predict the adoption rate of virtualization among small to medium-sized businesses will double in the next two years, making virtualization technology relatively mainstream. There are different...

    Provided By Symantec

  • Webcasts // Nov 2010

    Webcast: Smart Route to Windows 7

    Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process. During this 30 minute...

    Provided By Symantec

  • White Papers // Oct 2010

    Reputation-Based Security an Analysis of Real World Effectiveness

    In September of 2009, Symantec released its first reputation based security offering as a part of its consumer security products. They have given us insight into the types of threats that can be effectively detected using a reputation system and they have helped us to understand how to adjust the...

    Provided By Symantec

  • White Papers // Oct 2010

    W32.Stuxnet Dossier

    W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats the author have analyzed. In this paper the author take a detailed look at Stuxnet and its various components and particularly focus on the...

    Provided By Symantec

  • White Papers // Sep 2010

    The Risks of Social Networking

    Social networks are an inherent part of today's Internet and used by more than a billion people worldwide. They allow people to share ideas and interact with other people, from old friends to strangers. This interaction reveals a lot of information, often including personal information visible to anyone who wants...

    Provided By Symantec

  • White Papers // Sep 2010

    The Rise of PDF Malware

    The PDF file format has become a popular file format since its release as an open standard. Its portable nature, extensive feature list, and availability of free tools to read and author them have made it a de facto standard for printable documents on the Web. As it gained more...

    Provided By Symantec

  • Case Studies // Aug 2010

    Legal Aid Center of Southern Nevada: Restoring Justice and Data Faster With Symantec and Kortek Solutions

    With 18,000 clients in the past year and demand growing, Legal Aid Center of Southern Nevada provides free legal advice and representation to low-income residents who can't afford an attorney. With a spike in the state's population growth and 11.2 percent of Southern Nevadans below the poverty line, these services...

    Provided By Symantec

  • White Papers // Jun 2010

    Symantec is Windows 7 Migration

    By the end of 2010, almost 20 percent of the global IT workforce will be running Microsoft Windows 71 - taking advantage of productivity and connectivity features that promise to make it the world's preferred business operating system. Like any large-scale IT transformation, Windows 7 migration presents its share of...

    Provided By Symantec

  • White Papers // May 2010

    Symantec Intelligence Quarterly

    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. More than 240,000 sensors in over 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec Deep Sight Threat Management...

    Provided By Symantec

  • Case Studies // Apr 2010

    Symantec Case Study: Noel Leeming Group Limited

    With over 90 retail stores across New Zealand, Noel Leeming Group's success is built on its technology expertise and superior customer service. They wanted centralized IT team servicing decentralized users also In-house software incorrectly delaying genuine business emails. To master these challenges they turned MessageLab. MessageLabs Hosted Email AntiSpam, AntiVirus...

    Provided By Symantec

  • White Papers // Apr 2010

    Symantec Internet Security Threat Report: Trends for 2009

    This summary will discuss current trends, impending threats, and the continuing evolution of the Internet threat landscape in 2009 based on data discussed within the Symantec Global Internet Security Threat Report. There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec...

    Provided By Symantec

  • Case Studies // Mar 2010

    Cholet Town Hall Gains a Secure Information System With Symantec

    With an information system linking 40 sites across the region, a broad diversity of access points, and nearly 100 third-party applications, Cholet Town Hall was faced with a complex problem when it came to endpoint security. The French local authority therefore implemented a global solution combining Symantec Endpoint Protection, Symantec...

    Provided By Symantec

  • White Papers // Mar 2010

    Pay-Per-Install: The New Malware Distribution Network

    Malware authoring and distribution has become very profitable over the years. Earlier, malware was written mainly for fame and notoriety. However, it has now become a very profitable enterprise, backed by a strong business model. The process of propagating and distributing malware has been evolving constantly. A few years back,...

    Provided By Symantec

  • White Papers // Mar 2010

    Symantec Protection Suite Add-On for Hosted Email Security

    This paper studies malware and spam as the two most harmful threats to email and IT security. While malware and spam tend to cause tremendous harm to the health and viability of IT networks, it is email security that deserves tremendous attention. This paper looks at cyber criminal attacks that...

    Provided By Symantec

  • Webcasts // Mar 2010

    Moving Your IT Into the Cloud: Guidance and Options

    This webcast provides business and IT leaders with advice and options for planning and implementing a cloud solution to improve their business processes, enable business innovation, and improve the effectiveness of their workforce. The attendee will learn about the benefits of cloud computing, choosing the right cloud solution, best practices,...

    Provided By Symantec

  • White Papers // Feb 2010

    Next Generation Data Protection With Symantec NetBackup 7

    Challenges to information security are on the rise with data security facing serious challenges. Protection of data is possible only once the IT infrastructure at a data center is safeguarded with the latest technology. New in the line of data security software is the Symantec NetBackup 7 that is able...

    Provided By Symantec

  • White Papers // Feb 2010

    Migrating HP Serviceguard to Veritas Cluster Server on Linux

    This paper, created with the assistance of HP, illustrates a process to migrate an HP Serviceguard for Linux (SGLX) cluster to Veritas Cluster Server (VCS). An introduction to the architecture of VCS is described including sections comparing SGLX and VCS which contrast cluster terminology and describe architecture differences. A step-by-step...

    Provided By Symantec

  • White Papers // Feb 2010

    Backup Exec 2010: Deduplication Option

    Customers of all sizes and needs are seeking new ways to tackle their data protection challenges. While the challenges of data growth are not new, the pace of growth has become more rapid, the location of data more dispersed, and linkages between data sets more complex. Data reduplication offers companies...

    Provided By Symantec

  • Case Studies // Jan 2010

    Mitigating Against Security Risks and Ensuring IT Compliance - All at Reduced Cost

    It doesn't matter how fast a financial services organization is growing, how many new services are being introduced, or how quickly new customers are coming on board. One theme remains of paramount importance: reducing IT risk and achieving compliance objectives. For Abu Dhabi Commercial Bank (ADCB) these same principles apply,...

    Provided By Symantec

  • White Papers // Jan 2010

    Securing Your Company's Confidential Data

    Data volume is on the rise. Companies are collecting and storing more information than ever - about employees, customers, transactions, partners and assets. And this data is being accessed and shared in new ways such as through mobile devices and collaboration technologies. It's becoming increasingly important for companies to protect...

    Provided By Symantec

  • Webcasts // Jan 2010

    Driving Cost Out of the Data Center With Veritas Cluster File System and Veritas Cluster Server

    Looking for real life examples on how other customers are driving cost out of their datacenter? Learn how Cluster File System High Availability is being used to reduce or even eliminate downtime costs through its fast failover capabilities. In addition, find out how other customers now finding additional new and...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce Your Storage Footprint and Improve File Server Performance With Archiving

    Reduce the storage footprint and reclaim space on the file servers that is unnecessarily housing large, old and duplicate data. Has a person ever run an analysis to see how old the information is that one is constantly backing up and having to manage? Is one struggling with performance and...

    Provided By Symantec

  • Webcasts // Jan 2010

    Whose Data Is It Anyway?

    How does one manage unstructured confidential data and prevent a breach? Unstructured data continues to grow at over 60% per year. Data security teams may have little or no visibility into where confidential data is stored, who is responsible for the data or who has access to that data. In...

    Provided By Symantec

  • Webcasts // Jan 2010

    How to Get Your SharePoint Growth Under Control and Prepare for SharePoint 2010

    If the person is looking into or already have SharePoint sites within the organization, optimizing storage resources should be top of mind. The attendee is likely enabling document versioning to enable better collaboration - but does he realize every new document version creates a whole new file in the SQL...

    Provided By Symantec

  • Webcasts // Jan 2010

    Redefining Endpoint Management With Symantec IT Management Suite 7.0

    Symantec IT Management Suite 7.0 reduces the cost and complexity of owning and managing corporate IT assets including desktops, laptops, and servers. View this webcast and discover what's new in Symantec IT Management Suite (formerly Altiris Total Management Suite), how ITMS automates common IT processes and increases service levels.

    Provided By Symantec

  • Webcasts // Jan 2010

    Your Business Is at Risk. Protect It Completely

    What would happen to the business if one lost the customer data? If company records or intellectual property were stolen? It is estimated that 42% of small business customers have switched vendors because of the business's unreliable computing system. In this economy - when retaining every customer is key to...

    Provided By Symantec

  • Webcasts // Jan 2010

    Secure and Manage Your Data in Amazon's Cloud

    Moving all or part of the infrastructure to Amazon's Elastic Compute Cloud? Then one is also considering how to protect and manage the cloud storage online. This webcast gives answers around securing the information in the cloud. View now, have confidence in the cloud.

    Provided By Symantec

  • Webcasts // Jan 2010

    Complete Protection Without Compromise

    One faces formidable challenges every day balancing the need for security and increased data protection with the flexibility demanded by the rest of the organization. Strategy can take a backseat while one concentrates on day-to-day firefighting. One thing a person shouldn't have to do is compromise the security and availability...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Smart Route to Windows 7

    As businesses review their upcoming migration to Windows 7, it is essential to review not only the migration tools but the entire IT infrastructure and areas in which efficiencies can be gained to make this a truly transformative event. Businesses should review their Windows 7 client security strategy to ensure...

    Provided By Symantec

  • Webcasts // Jan 2010

    Is Social Networking Foiling Your Security Practice?

    This educational webcast teaches how the attendee can "Go social" without going sleepless. Social networking is rapidly evolving into one of the biggest threats to data security out there today. But the reality is, this medium is also a great way for the employees to collaborate and communicate. The challenge...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce the Cost and Complexity of Compliance

    Is the regulatory compliance program costly and time-consuming? Is one having trouble providing ongoing support for audits? Does one have the resources to keep up with ever-changing regulations and industry standards? What about the overall IT risk posture?. Does one know if all the IT assets are properly protected? Can...

    Provided By Symantec

  • Webcasts // Jan 2010

    Carve Out IT Budget Through Better Software Management

    Software is one of the more expensive components of an IT budget. Keeping track of who has the software, who pays for it, and who uses it can become very complex. Does one have to prepare for an upcoming software vendor audit? Is it the time to renew expensive software?...

    Provided By Symantec

  • Webcasts // Jan 2010

    Unified IT Security Management With Symantec Protection Center and Symantec Protection Suites

    Symantec Protection Center and Symantec Protection Suite introduce a new way organizations will realize the benefits of intelligent management and unified security solutions in today's complex IT infrastructures. Minimal insight into the threats the environment faces, slow responses to security incidents when they take place and a lack of automation...

    Provided By Symantec

  • White Papers // Jun 2012

    Legal Compliance in Electronic Record Keeping

    Legislation dictates that companies must ensure the secure retention of records and information with emails making up a significant amount of such "records". Regulated retention is a major issue for non-government organizations. This paper outlines the key points that you need to ensure your company is dispute ready with proper...

    Provided By Symantec

  • White Papers // Sep 2011

    Business benefits of email archiving

    The burdens of email do not have to outweigh its uses. Email archiving is an essential business tool, and the benefits can go far beyond the realm of the IT department. It is more than regulatory compliance; it is a strategic tool for productivity, long-term information storage, discovery, retrieval and...

    Provided By Symantec

  • White Papers // Oct 2011

    Protecting the enterprise: Best practice for information security

    Keeping a connected enterprise secure requires both proactive and reactive approaches. The number of threats from cybercriminals -- malware, insider data breaches and even cyber-espionage -- is growing, so organisations should have consistent and unified barriers in place to prevent attacks and protect the business against them. This best practice...

    Provided By Symantec

  • Webcasts // Jan 2010

    Your Business Is at Risk. Protect It Completely

    What would happen to the business if one lost the customer data? If company records or intellectual property were stolen? It is estimated that 42% of small business customers have switched vendors because of the business's unreliable computing system. In this economy - when retaining every customer is key to...

    Provided By Symantec

  • Webcasts // Jan 2010

    Secure and Manage Your Data in Amazon's Cloud

    Moving all or part of the infrastructure to Amazon's Elastic Compute Cloud? Then one is also considering how to protect and manage the cloud storage online. This webcast gives answers around securing the information in the cloud. View now, have confidence in the cloud.

    Provided By Symantec

  • Webcasts // Jan 2010

    Complete Protection Without Compromise

    One faces formidable challenges every day balancing the need for security and increased data protection with the flexibility demanded by the rest of the organization. Strategy can take a backseat while one concentrates on day-to-day firefighting. One thing a person shouldn't have to do is compromise the security and availability...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Smart Route to Windows 7

    As businesses review their upcoming migration to Windows 7, it is essential to review not only the migration tools but the entire IT infrastructure and areas in which efficiencies can be gained to make this a truly transformative event. Businesses should review their Windows 7 client security strategy to ensure...

    Provided By Symantec

  • White Papers // Feb 2010

    Next Generation Data Protection With Symantec NetBackup 7

    Challenges to information security are on the rise with data security facing serious challenges. Protection of data is possible only once the IT infrastructure at a data center is safeguarded with the latest technology. New in the line of data security software is the Symantec NetBackup 7 that is able...

    Provided By Symantec

  • Webcasts // Nov 2010

    Webcast: Smart Route to Windows 7

    Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process. During this 30 minute...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • Webcasts // Jan 2009

    Securing and Managing Endpoints - The Case for Convergence

    The presenter discusses how the convergence of security, compliance, and cost-effective management of endpoint systems is seen as an emerging characteristic of organizations with Best-in-Class results. The presenter highlights that companies adopting this integrated approach are realizing a multitude of business benefits.

    Provided By Symantec

  • Webcasts // Feb 2009

    Running Backups on a Budget - Protecting Your Data and the Bottom Line!

    Data volumes increase while IT budgets decrease. Efficiently leverage the Backup Exec Family to keep critical data protected and easily meets recovery point objectives without breaking the budget. The attendee will learn how to reduce storage utilization by more than 50% with patent pending granular recovery technology.

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec Backup Exec System Recovery 2010: Protect Against Business Downtime and Disaster With Rapid, Reliable Backup and Recovery

    Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small businesses that helps minimize downtime and avoid disaster by easily recovering data files or complete systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. New functionality in Backup Exec...

    Provided By Symantec

  • Webcasts // Feb 2009

    Solving Your Top 5 Microsoft Hyper-V Backup and Recovery Challenges

    Is the business planning to implement Microsoft Hyper-V in order to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several challenges. One of the biggest challenges is implementing a reliable backup and recovery solution to protect critical data distributed...

    Provided By Symantec

  • Webcasts // Feb 2009

    How to Do More With Less When Protecting Microsoft Exchange With Veritas NetBackup

    With everyone being asked to do more with less why shouldn't the backup application be asked the same? Symantec's Granular Recovery Technology eliminates MAPI backups and allows for the quick recovery of individual email messages and the entire application. The attendee will learn how to shorten the recovery time, backup...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Microsoft Exchange Archiving and Retention Policy Development Featuring Old Dominion University

    The presenter will detail Old Dominion University's Notes to Exchange Migration which featured a Deployment of Microsoft Exchange 2007 and Symantec Enterprise Vault. The presenters will discuss few points such as deletion vs. Retention, exchange retention folders and archiving, records vs. non records and gives tips for simplifying the retention...

    Provided By Symantec

  • Webcasts // Feb 2009

    In These Economic Times, How Can Endpoint Data Loss Prevention Help You Protect Confidential Information?

    When the economy creates a challenge for companies, they might look to reduce costs or evaluate hiring strategies. If a company is looking to reduce its workforce, how has it prepared to protect its intellectual property, customer and employee data? Recent research has shown that employees who fear losing their...

    Provided By Symantec

  • White Papers // Dec 2009

    Selecting Your Hosted Security Provider: What Every IT Manager Needs to Know

    Overall hosted security services provide savings and improved protection on many fronts, and make good economic and technical sense for most businesses. At Symantec Hosted Services - MessageLabs, the hosted security solution is second to none when it comes to accuracy, support, technical depth and research, depth of threat analysis...

    Provided By Symantec

  • Webcasts // Feb 2009

    Creating a Protected Endpoint and Messaging Environment with Symantec Multi-tier Protection

    Over 12,000 new malicious code threads are detected every day and 80% of all email identified as spam, the need to ensure complete protection is more important than ever before. The presenter of this webcast will discuss how Symantec Multi-tier Protection creates a protected endpoint and messaging environment while controlling...

    Provided By Symantec

  • White Papers // Oct 2009

    Eradicate Spam and Gain 100% Assurance of Clean Mailboxes

    Many great inventions have been used for substantial benefits and equal amounts of harm. This trend certainly applies to the Internet. While the medium has given the world a wealth of information that is instantly accessible with the click of a mouse, it has also spawned a breeding ground for...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • Webcasts // Feb 2009

    Why Is Off-Site Data Storage Important?

    Many small and medium sized businesses view off-site data protection services as a costly and unnecessary investment. However, new regulations, requirements and advancements have made off-site data a greater consideration. The presenter of this webcast examines off-site data storage and its role in disaster protection. Why is it necessary and...

    Provided By Symantec

  • White Papers // Oct 2009

    eDiscovery Compliance and the New Requirements of IT: The IT Manager's Guide to 100% Compliance

    Through the implementation of a strategic eDiscovery compliance program, incorporating clearly written rules, formal employee education, and a proven-effective Hosted Service Archiving Solution, US and Canadian employers can quickly and cost-effectively preserve, protect, and produce legally compliant email and other Electronically Stored Information (ESI) when compelled to do so by...

    Provided By Symantec

  • Webcasts // Jan 2009

    Data Loss Prevention: Protect the Data That Drives Your Business

    How to prevent the loss of company's confidential data. The attendee will learn how Data Loss Prevention (DLP) solutions enable business and government organizations to safeguard their most valuable assets - intellectual property, customer data, and other sensitive information. Understand why DLP is a top 3 priority for CIOs in...

    Provided By Symantec

  • White Papers // Nov 2009

    Social Networking: Safely Manage the Paradigm Shift and Leverage Its Full Potential

    The phenomenal growth and popularity of social media websites has created promising opportunities for businesses as well as dangerous new ways for cyber-criminals to create havoc on corporate networks. This white paper from Symantec Hosted Services, written especially for IT and Security Managers, illustrates the many ways in which social...

    Provided By Symantec

  • Webcasts // Jan 2009

    VMware Infrastructure Backup and Recovery Best Practices

    Planning to implement VMware to help reduce IT costs and improve scalability? There are many IT benefits to virtualizing a server environment and also several challenges. One of the biggest challenges is implementing a reliable backup and recovery solution to protect critical data distributed across both virtual and physical server...

    Provided By Symantec

  • White Papers // Apr 2009

    Can Heuristic Technology Help Your Company Fight Viruses?

    Electronic communication, which is an essential tool for businesses, is increasingly at risk due to the sophistication of email and web threats. Converging threats, combining viruses, spam and the web, to defraud unsuspecting victims or to disseminate malware make implementing reliable, effective protection essential for the corporate network and remote...

    Provided By Symantec

  • Webcasts // Jan 2009

    Stop Buying Storage: Increase Storage Utilization With Veritas Storage Foundation & Veritas CommandCentral

    Data volumes are growing at 60% per year, while storage utilization rates hover around 35%. As organizations are aggressively seeking to contain costs, leveraging existing storage assets is the easy answer. The presenter of this webcast discusses how Veritas Storage Foundation and Veritas CommandCentral optimize existing storage assets relieving organizations...

    Provided By Symantec

  • White Papers // May 2009

    Economic Stimulus Package and Health Care: Best Practices to Manage EHR and Minimize Security, Privacy and Compliance Risks

    MessageLabs Email Continuity Service helps organizations maximize email availability and guard against the disruption and data loss that can result from an email outage. Services include an on-demand Email Failover System that kicks in seamlessly when an outage occurs, allowing email users to continue sending and receiving messages through Outlook,...

    Provided By Symantec

  • Webcasts // Jan 2009

    Protect Your Data and Maintain High Availability for Your VMware Environment With Veritas NetBackup and Cluster Server for VMware ESX

    Organizations are using server virtualization to reduce costs and achieve greater flexibility; however, the risk of reduced data and application availability has slowed the implementation of production applications in virtual machines. Veritas Cluster Server for VMware is a comprehensive high availability and disaster recovery solution for the ESX platform, providing...

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Nov 2011

    Key eDiscovery Issues to Consider in 2011

    This white paper discusses the threats that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. It uses research from recent Osterman Research surveys, as well as information from a variety of other data sources to illustrate how to address and overcome security gaps.

    Provided By Symantec

  • White Papers // Feb 2009

    Compliance Rules: Rules and Tools, Policies and Best Practices for Cost-Effective, Comprehensive Compliance in the United States

    Organizations of all types and sizes, industries and professions have long been mindful of the need for legal and regulatory compliance. In the current economic environment, however, forward-thinking organizations now are shifting their focus somewhat. Mere adherence to laws and regulations is no longer enough. Thanks to tight economic conditions...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Managing Business Risks From the Use of IT

    The presenter of this webcast focuses on the relationship between business risks and use of IT. The presenter of this webcast throws light on key business risks from the use of IT, financial outcomes and self-insurance thresholds and outcomes by industry and size of organization.

    Provided By Symantec

  • Webcasts // Feb 2009

    Small Business Backup: Your Data May Not Be as Protected as You Think

    The loss of critical data can be crippling to any business, still many small and mid-size companies do not adequately backup their data. An independent study conducted, reveals the pitfalls of poorly implemented backup strategies - and the real world consequences of unexpected data loss. This new study illuminates the...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • Webcasts // Feb 2009

    Epic Games Deploys Serious Archiving Technology With Enterprise Vault

    The attendee of this webcast will learn more about how Epic leveraged Symantec Enterprise Vault with Microsoft Exchange 2007 to meet storage optimization and E-Discovery demands. After utilizing archiving solutions from EMC and Mimosa, Epic Games migrated to Symantec Enterprise Vault and Discovery Accelerator.

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • White Papers // Feb 2009

    Top 5 Security Tips for 2009

    Email, internet usage and electronic communication are used more and more in everyday business. In fact, one could say they are an absolutely essential tool for any organization today. They've brought a whole new world of ways to save money, time and hassle - from online banking to instant messaging...

    Provided By Symantec

  • Webcasts // Jan 2009

    Complete Protection of Your Virtual World: Award Winning Backup and Recovery With NetBackup 6.5

    NetBackup for VMware is the most integrated VMware backup solution on the market today. The attendee will experience just how NetBackup delivers the industry first granular recovery capability from a single image level backup. In combination with VMware Consolidated Backup (VCB), NetBackup for VMware delivers both the backup performance and...

    Provided By Symantec