Symantec

Displaying 41 - 50 of 243 results

  • Symantec Advanced Threat Protection: Network

    White Papers // Oct 2015 // provided by Symantec

    Miercom conducted an independent third party validation of the Symantec Advanced Threat Protection: Network appliance, the Cisco SourceFire and the FireEye 1310. Security Effectiveness testing verified the detection and blocking of multiple malware threats including, legacy, Advanced Evasion Techniques, Advanced Persistent Threats, BotNet, RATs, active threats and malicious documents. The ...

    Download Now
  • EU General Data Protection Regulation

    White Papers // Jul 2015 // provided by Symantec

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in ...

    Download Now
  • The Forrester Wave™: Endpoint Security Suites, Q4 2016

    White Papers // Feb 2017 // provided by Symantec

    The 15 Providers That Matter Most And How They Stack Up This white paper explores 25-criteria evaluation of endpoint security suite providers, and identifies the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos,

    Download Now
  • Next Generation Endpoint: Hype or Hope?

    White Papers // Feb 2017 // provided by Symantec

    A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process. This paper addresses the trends that have emerged to deal with malware

    Download Now
  • Symantec Endpoint Protection + Secure Web Gateway

    White Papers // Feb 2017 // provided by Symantec

    Security leaders can now leverage and optimise protection across networks and endpoints, providing a full spectrum of threat protection with fewer integration headaches. Granular controls allow you to take proactive action to blacklist attacks and apply security policies that prevent the spread of attacks. And automated remediation ...

    Download Now
  • Code Signing: To Increase Downloads, Instill Trust First

    White Papers // Nov 2016 // provided by Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

    Download Now
  • Top Five SSL Attack Vectors

    White Papers // Nov 2016 // provided by Symantec

    Cryptography forms the basis of trust on the internet. Without it, secure online shopping transactions wouldn't be possible, private messages couldn't be sent and sensitive corporate communications couldn't safely transfer across websites and networks.

    Download Now
  • Website Security Threat Report 2016

    White Papers // Nov 2016 // provided by Symantec

    The WSTR provides a view into the current state of the online threat landscape, alongside invaluable insights and input from website security experts.

    Download Now
  • 10 essential questions about website security

    White Papers // Nov 2016 // provided by Symantec

    Customers are spending more time online than ever before, researching, browsing and buying. They need to trust the websites they visit and the businesses they interact with; they need to trust that their personal information is secure and that it’s being handled correctly. This has made website security critical to ...

    Download Now
  • Evolve: Your Website Security

    White Papers // Nov 2016 // provided by Symantec

    Security teams need more time to defend against increasingly sophisticated attacks and they need a website security plan that prepares them for the future. Our latest whitepaper explores how a changed threat landscape has prompted an evolution in website security.

    Download Now