Symantec

Displaying 161-200 of 282 results

  • White Papers // Jun 2009

    Automatic Generation of String Signatures for Malware Detection

    Scanning les for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware...

    Provided By Symantec

  • White Papers // Jun 2009

    Converged Threats on the Security Landscape

    The pervasive presence of malware on the Internet today creates more opportunities for mixing and matching dangerous content than has ever been possible. The essence of a converged threat is the combination of viruses, spyware, phishing, spam and other attempts at attack or exploitation of vulnerabilities that can disrupt networks...

    Provided By Symantec

  • White Papers // May 2009

    Economic Stimulus Package and Health Care: Best Practices to Manage EHR and Minimize Security, Privacy and Compliance Risks

    MessageLabs Email Continuity Service helps organizations maximize email availability and guard against the disruption and data loss that can result from an email outage. Services include an on-demand Email Failover System that kicks in seamlessly when an outage occurs, allowing email users to continue sending and receiving messages through Outlook,...

    Provided By Symantec

  • White Papers // May 2009

    Managed Outcome: A New Paradigm for IT Departments

    A real-world example of the benefits of the Managed Outcome model is offered by Forrester Research According to Forrester, "A successful transition to a Managed Outcome relationship typically yields an additional 20% to 30% savings improvement" beyond typical expectations from outsourcing technical staff. Forrester adds that other key benefits of...

    Provided By Symantec

  • White Papers // May 2009

    Symantec: Malicious Code Activity Spiked in 2008

    As malicious code continues to grow at a record pace, attackers are shifting away from the mass distribution of a few threats to the micro-distribution of millions of distinct threats. Moreover, these cybercriminals are intent upon distributing threats that steal confidential information, particularly bank account credentials and credit card data.

    Provided By Symantec

  • White Papers // May 2009

    Veritas Storage Foundation for Windows: Dynamic Multi-Pathing Competitive Comparisons

    Multi-pathing software provides the intelligence necessary to manage multiple I/O paths between a server and a storage subsystem. When configured for redundancy, a single path is dedicated to I/O transfer, while other paths are in standby mode. The software manages failover between the I/O paths, thus eliminating the potential for...

    Provided By Symantec

  • White Papers // May 2009

    Enterprise Vault 8.0: File System Archiving

    Enterprise Vault surpasses the scope, ability and performance of typical file management applications which merely move data based on broad policies from one storage device to another. As files are now routinely being requested for internal and external investigations, Enterprise Vault File System Archiving enables the organizations to meet their...

    Provided By Symantec

  • White Papers // May 2009

    VERITAS Storage Foundation Cluster File System 5.0 From Symantec: Using CFS for Oracle Fast Failover

    Symantec Cluster File System provides an efficient solution for fast failover of Oracle databases without incurring the cost and complexity of a Oracle RAC environment. It provides downtime SLAs within acceptable limits for most applications. The fundamental properties of CFS including access to shared file systems by applications running on...

    Provided By Symantec

  • White Papers // May 2009

    Essential Server Management for Mid-Sized Organizations: A Strategy for overcoming Challenges in Today's Complex and Costly IT Environments

    The task of server management is more costly and complex than ever. At the same time, there have never been greater expectations for IT departments to deliver business value to the organizations they serve. Altiris Server Management Suite from Symantec provides essential server management that enables IT administrators to focus...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation for Windows

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation HA for Windows From Symantec

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • White Papers // May 2009

    Top 10 Things Small Businesses Must Know About Protecting and Securing Their Business Data

    Small business owners and IT personnel agree that securing and backup up their data is critical - yet why are so many businesses falling short? Often, they need best practices to know where to begin. Donna Childs, author and small business consultant provides guidelines so small businesses can take the...

    Provided By Symantec

  • White Papers // May 2009

    The Endpoint Security Shootout: How the Biggest Vendors Measure Up

    Looking for an endpoint security solution for your business? To avoid making an investment you'll end up regretting, you need to make sure you do your research. In addition to strong security features, you also need to make sure that the security product's performance won't slow your business down. Get...

    Provided By Symantec

  • White Papers // May 2009

    Top Benefits of Symantec Protection Suite

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Find out how you can protect against zero-day threats, safeguard intellectual property and ensure compliance. Tired of all the false positives you get with anti-phishing products? See...

    Provided By Symantec

  • White Papers // Apr 2009

    Are You Getting the Best Security for Your Money?

    Managing and protecting every device in an enterprise isn't easy. But an enterprise puts itself at risk if its IT organization lacks the visibility to protect the business' sensitive information, wherever it may be. Such visibility is not possible with a patchwork of security point products .To ensure that their...

    Provided By Symantec

  • White Papers // Apr 2009

    Fast Memory State Synchronization for Virtualization-Based Fault Tolerance

    Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating systems. While initial prototypes show promise virtualization-based fault-tolerant architecture still experiences substantial performance overhead especially for data-intensive workloads. The main performance challenge of virtualization-based fault...

    Provided By Symantec

  • White Papers // Apr 2009

    Enterprise Vault 8.0: Technical Overview

    Unstructured content like email and files are a huge management problem for companies of all sizes. The growth of this information in the form of email and files on storage devices and frontline servers are causing headaches as companies attempt to manage IT risk but maximize performance. This whitepaper has...

    Provided By Symantec

  • White Papers // Apr 2009

    The 12 Business Benefits of Workspace Virtualization: For Cash-Strapped Financial Institutions, Bottom-Line Cost Savings Come With Added Manageability and Security Perks

    Workspace or endpoint virtualization is a centrally-controlled computing model for which applications are served up to individual desktops. "It offers an 'implement once, deploy many' approach to winning control over one of the most onerous security challenges in business? Institutions benefit from configuration and change control that directly addresses the...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 1 - Solution Overview

    This whitepaper provides a high-level overview of the PST problem, the issues with PST migration, and how the PST migration tools available in Enterprise Vault can solve them. PST files (also known as Personal Folders or Outlook data files) were not designed to handle the rigorous demands of today's large-scale...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 3 - Planning, Tech Tips & Best Practice

    This whitepaper looks at some important aspects of a PST migration project; namely, planning and best practice usage of the tools in different migration scenarios. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. One of the key decisions when planning PST migration is choosing the...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec

  • White Papers // Apr 2009

    Can Heuristic Technology Help Your Company Fight Viruses?

    Electronic communication, which is an essential tool for businesses, is increasingly at risk due to the sophistication of email and web threats. Converging threats, combining viruses, spam and the web, to defraud unsuspecting victims or to disseminate malware make implementing reliable, effective protection essential for the corporate network and remote...

    Provided By Symantec

  • White Papers // Apr 2009

    Five Critical Recovery Flaws Your Last Disaster Recovery Test Missed

    Businesses today are spending millions of dollars to develop and maintain Disaster Recovery (DR) infrastructures that will ensure business continuity. But despite such huge investments of time and resources, most IT professionals are still not completely confident in their ability to recover in an emergency. This paper examines how automated...

    Provided By Symantec

  • White Papers // Apr 2009

    Premium Support Services Deliver: The Return on Investment for Symantec Business Critical Services

    Given today's challenging economic climate, companies across a wide range of industries are focusing on staying financially sound, serving markets and customers, and doing more with less. Reducing and controlling costs is a particularly strong area of emphasis across all functional areas, especially IT operations. This white paper is intended...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec Brightmail Gateway v8.0

    The ongoing issue facing messaging administrators is how to preserve the value of messaging in light of escalating security threats and compliance requirements. Organizations are seeing an increased need for integrated secure content and threat management solutions that address multiple threats in a single solution. The Symantec Brightmail Gateway (Brightmail...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec APJ Internet Security Threat Report Trends for 2008

    The Symantec APJ Internet Security Threat Report provides an annual overview and analysis of Internet threat activity, a review of known vulnerabilities, and highlights of malicious code in the Asia-Pacific/Japan (APJ) region. Trends in phishing and spam are also assessed. Previously, Symantec presented data on a six-month basis. This volume...

    Provided By Symantec

  • White Papers // Apr 2009

    Veritas CommandCentral - Supporting the Virtual Enterprise

    Veritas CommandCentral is an enterprise storage management solution that provides the ability to manage storage effectively not only in the physical environment, but in the virtual environment as well. As organizations evaluate different physical and virtual solutions, it is imperative to consider the management implications of server and storage virtualization....

    Provided By Symantec

  • White Papers // Mar 2009

    Risk, Readiness and Redundancy: PCI Compliance Automation With Symantec Control Compliance Suite

    For most of this decade, the major credit card companies have been aggressively developing standards to establish a common approach to protect the privacy and security of sensitive credit card data. In June 2001, Visa mandated the Cardholder Information Security Program (CISP) for merchants and financial institutions handling its card...

    Provided By Symantec

  • White Papers // Mar 2009

    Future-Proof Your IT Infrastructure

    Today's tough economic climate is challenging companies to reduce costs while continuing to focus on improving efficiencies. For IT departments everywhere, it's truly a "do more with less" dilemma. Client and server management suites from Symantec allow organizations to significantly reduce the hidden costs of managing endpoint systems throughout the...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • White Papers // Mar 2009

    Creating a Sustainable Infrastructure

    Compliance projects can bury organization in process and paperwork. Creating a sustainable compliance operation starts with using risk management to prioritize and continues with understanding how to leverage new technology in security, storage and networking infrastructure to create a true compliance infrastructure. The tools needed to become compliant are a...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

    This whitepaper discusses the security aspects of archiving from Sharepoint with Enterprise Vault 8.0. It has discussed permissions required on SharePoint servers as well as their requirements in IIS. It also discusses the client access methods such as links and Web-parts. This whitepaper assumes the reader has already read the...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for File System Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory, NetApp Filers, and EMC Celerras. It also provides insight as to how to change some of the settings to be configured in line with organizational preferences....

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • White Papers // Mar 2009

    Security Model for Compliance Accelerator 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and Internet Explorer. It will also provide insight as to how to configure Compliance department roles to be configured in line with organizational preferences. This whitepaper...

    Provided By Symantec

  • White Papers // Mar 2009

    How Enterprise Vault Supports Exchange 2007 High Availability Options

    This paper outlines the high availability options introduced in Exchange 2007, namely LCR, CCR and SCR, and discusses how Enterprise Vault supports them. This paper is intended only to position these technologies with respect to Enterprise Vault and is not intended to be a deep level technical discussion or a...

    Provided By Symantec

  • White Papers // Mar 2009

    Veritas Storage Foundation in a VMware ESX Environment: Linux and Solaris x64 Platforms

    This paper describes how to configure and use Veritas Storage Foundation in a VMware ESX environment. Because most features in Storage Foundation are supported in a VMware environment, this paper focuses on the features that work differently in a VMware environment and why certain features are not supported. The operating...

    Provided By Symantec

  • White Papers // Mar 2009

    How Veritas Storage Foundation Complements Microsoft Windows Server: Enhancing the Data Center

    Microsoft introduced several new storage management features in Windows Server 2003. In Windows Server 2008, they extend functionality to include the ability to shrink partitions and volumes online and DSMs to configure multi-pathing in iSCSI and FC environments. This paper will outline how Veritas Storage Foundation for Windows integrates and...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec White Paper - 7 Steps to Windows 7

    Symantec, a provider of security, storage, and systems management solutions, suggests seven steps that ensure smooth shift and sustained business value for migration to Windows 7. It discusses efficient, cost-effective, and sustainable migration steps for Windows 7 that is productive and secure. On-demand, user-based provisioning combined with standard configurations and...

    Provided By Symantec

  • White Papers // Jan 2010

    Real-Time Data Analysis With Altiris IT Analytics and a Workflow Connector Component

    Symantec Altiris IT Analytics makes real time workflow evaluation of data a reality. This document entails a total description of IT Analytic component, how to configure and use it to suit workflow applications and make it go smoothly. With this application, it is possible to create, manage, test, change and...

    Provided By Symantec

  • White Papers // Mar 2010

    Symantec Protection Suite Add-On for Hosted Email Security

    This paper studies malware and spam as the two most harmful threats to email and IT security. While malware and spam tend to cause tremendous harm to the health and viability of IT networks, it is email security that deserves tremendous attention. This paper looks at cyber criminal attacks that...

    Provided By Symantec

  • White Papers // Dec 2009

    Symantec Brightmail Anti Phishing

    In today's information driven world, cyber criminals are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. One method that is frequently employed is phishing, which the criminally fraudulent process of attempting to acquire sensitive information such...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec Backup Exec System Recovery 2010: Protect Against Business Downtime and Disaster With Rapid, Reliable Backup and Recovery

    Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small businesses that helps minimize downtime and avoid disaster by easily recovering data files or complete systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. New functionality in Backup Exec...

    Provided By Symantec

  • White Papers // Nov 2010

    Best Practices for Implementing a Security Process

    There is no doubt that the threat facing organizations today is enormous. At the same time, many organizations believe that improving security technology is the answer to solving the complex security challenges of today. Security technology has evolved from static firewalls and anti-virus products to full suites of tools that...

    Provided By Symantec

  • White Papers // Nov 2010

    Securing Your Mobile Workforce

    This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec. It also provides advice, best practices, and insight on how to create security and management policies for a distributed workforce.

    Provided By Symantec

  • White Papers // Nov 2010

    Managing Your Wireless Workforce

    Explosive growth in the mobile workforce has led to increasing attention paid to the security of mobile data and devices. Mobile data security is most effective when implemented in a series of layers: installing smart firewalls, deploying anti-virus software, and using encrypted connections. True mobile security doesn't stop at devices...

    Provided By Symantec

  • White Papers // Nov 2010

    Break From The Routine

    With one IT department in five spending more than half its time and resources on routine updates, maintenance and administration of existing systems, it is not surprising that top business objectives such as business process improvements, reducing enterprise costs, increasing the use of information/analytics, improving workforce effectiveness and attracting new...

    Provided By Symantec

  • White Papers // Nov 2010

    Mobility, Employees, Policies

    According to a 2009 survey by New York-based research firm Access Markets International (AMI) Partners, small and mid-sized businesses (SMBs) are becoming increasingly mobile organizations. This paper will discuss the growing concerns these organizations face with an increasingly distributed and mobile workforce, their specific information security needs and initial protective...

    Provided By Symantec

  • White Papers // Nov 2010

    Legal Risks of uncontrolled email and web

    Access to email and the Internet is a business critical application for most organizations, but the attributes that make such resources so essential inevitably generate significant risks for employers. Incidents of email and Internet misuse continue unabated. This paper considers some of the main risks that arise from employee use...

    Provided By Symantec

  • White Papers // Nov 2010

    Best Practices for Managing Financial Services Compliance

    Financial service organizations are constantly grappling with ever-changing, ever-mounting regulatory obligations to supervise and archive all discoverable content. This white paper discusses the fundamentals of financial services compliance. It then puts forth a case for considering archiving and security as a unified decision, and proposes an archiving solution based on...

    Provided By Symantec

  • White Papers // Jan 2010

    8 Key Requirements of an IT Governance, Risk and Compliance Solution

    Today IT security teams must contend with a dizzying array of challenges, from cyber-crime and government regulation to the ever increasing complexity of the IT environment itself. For organizations that handle large volumes of customer and employee information, the risk of a data breach is now higher than ever before....

    Provided By Symantec

  • White Papers // Nov 2009

    Confidence in the Cloud: Five Ways to Capitalize With Symantec

    Cloud computing is gaining significant traction as a new IT delivery model with potential business and financial benefits. Because cloud computing is still relatively new, organizations are grappling with what this emerging delivery model is, what some of the potential barriers are, and how best to take advantage of it....

    Provided By Symantec

  • White Papers // Dec 2009

    Anatomy of a Data Breach: Why Breaches Happen and What to Do About It

    For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. In fact, more electronic records were breached in 2008 than in the previous four years combined.1 this growth in...

    Provided By Symantec

  • White Papers // Jan 2010

    Microsoft Office 2000 and Security Against Macro Viruses

    This white paper discusses the new macro security features in Microsoft Office 2000. The first half of the paper provides information about the new features. The second half answers questions about the issues that people are likely to have about what all this means in the context of macro viruses....

    Provided By Symantec

  • White Papers // Apr 2009

    Premium Support Services Deliver: The Return on Investment for Symantec Business Critical Services

    Given today's challenging economic climate, companies across a wide range of industries are focusing on staying financially sound, serving markets and customers, and doing more with less. Reducing and controlling costs is a particularly strong area of emphasis across all functional areas, especially IT operations. This white paper is intended...

    Provided By Symantec

  • White Papers // Jan 2010

    Securing Your Company's Confidential Data

    Data volume is on the rise. Companies are collecting and storing more information than ever - about employees, customers, transactions, partners and assets. And this data is being accessed and shared in new ways such as through mobile devices and collaboration technologies. It's becoming increasingly important for companies to protect...

    Provided By Symantec

  • White Papers // Nov 2008

    Why Premium Support Is More Effective Than Standard Support in the Financial Services Industry

    Financial services industry customers are challenged as never before to respond quickly - armed as they are with limited budgets - to accommodate rapid changes in technology and customer demand. To be a winner in this field, companies must be able to guarantee a level of service quality and continuity...

    Provided By Symantec

  • White Papers // Apr 2010

    Symantec Internet Security Threat Report: Trends for 2009

    This summary will discuss current trends, impending threats, and the continuing evolution of the Internet threat landscape in 2009 based on data discussed within the Symantec Global Internet Security Threat Report. There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec...

    Provided By Symantec

  • White Papers // Oct 2010

    W32.Stuxnet Dossier

    W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats the author have analyzed. In this paper the author take a detailed look at Stuxnet and its various components and particularly focus on the...

    Provided By Symantec

  • White Papers // Oct 2010

    Reputation-Based Security an Analysis of Real World Effectiveness

    In September of 2009, Symantec released its first reputation based security offering as a part of its consumer security products. They have given us insight into the types of threats that can be effectively detected using a reputation system and they have helped us to understand how to adjust the...

    Provided By Symantec

  • White Papers // Sep 2009

    The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

    In today's turbulent economy, midsize and enterprise organizations are faced with increasingly tough challenges. Due to flat or shrinking budgets, many IT departments are coming under pressure to do more with less, all while expectations for greater IT responsiveness to organizational demands continue to rise. Adding further complication to an...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec Brightmail Gateway v8.0

    The ongoing issue facing messaging administrators is how to preserve the value of messaging in light of escalating security threats and compliance requirements. Organizations are seeing an increased need for integrated secure content and threat management solutions that address multiple threats in a single solution. The Symantec Brightmail Gateway (Brightmail...

    Provided By Symantec

  • White Papers // Aug 2009

    SMB Protection Gap: SMB Security and Data Protection: Survey Shows High Concern, Less Action

    Small and mid-size businesses (SMBs) are major contributors to business innovation, value, and growth-many expect them to take the lead in global economic recovery. So a 2009 survey showing widespread and serious information security vulnerabilities in this crucial business segment is cause for genuine alarm. This paper will outline that...

    Provided By Symantec

  • White Papers // Nov 2009

    Security and Privacy for Healthcare Providers

    As healthcare providers automate their medical records, clinical systems, and medical imaging, protecting the privacy of patient information and securing IT infrastructures is becoming increasingly challenging. Healthcare organizations are facing more security threats that increase the risks of inappropriate access to patient information, inability to access the information, and impaired...

    Provided By Symantec

  • White Papers // Jan 2010

    A Practical Approach to Information Management

    Information is the fundamental connecting fabric of businesses today. Businesses rely on information technology and systems to run their business and help to drive new opportunities, as well as to operate efficiently and comply with corporate governance practices and industry regulations. Yet most organizations today are not organized around information,...

    Provided By Symantec

  • White Papers // May 2010

    Symantec Intelligence Quarterly

    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. More than 240,000 sensors in over 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec Deep Sight Threat Management...

    Provided By Symantec

  • White Papers // Feb 2010

    Backup Exec 2010: Deduplication Option

    Customers of all sizes and needs are seeking new ways to tackle their data protection challenges. While the challenges of data growth are not new, the pace of growth has become more rapid, the location of data more dispersed, and linkages between data sets more complex. Data reduplication offers companies...

    Provided By Symantec

  • White Papers // Jul 2009

    Powering Linux in the Data Center

    Many IT professionals are drawn by the economy that Linux brings to the data center but are concerned about the potential risks that arise from trusting their business to "Free" software. For mission-critical enterprise data center applications, the complete line of Symantec data management and protection offerings delivers UNIX-class performance,...

    Provided By Symantec

  • White Papers // Nov 2009

    Database Storage Management With Veritas Storage Foundation by Symantec: Manageability, Availability, and Superior Performance for Databases

    Enterprises are required to manage a rapidly growing number of database-dependent applications and mission-critical database environments, often with stringent service level agreements and reduced operational budgets. The requirement for information availability has created an operational imperative to shrink database backup windows, recover more quickly from outages, and move non-critical, resource-intensive...

    Provided By Symantec

  • White Papers // Oct 2009

    7 Steps to Windows 7: Ensuring a Smooth Transition and Sustained Business Value From Your Windows 7 Migration

    Migrating to Microsoft Windows 7 can be intimidating. One wants to take advantage of new Windows 7 productivity, security, and control enhancements - but at this scale, how can one keep the migration efficient, cost-effective, and sustainable, while protecting end-user productivity? But the migration can be an opportunity as well...

    Provided By Symantec

  • White Papers // Apr 2009

    Fast Memory State Synchronization for Virtualization-Based Fault Tolerance

    Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating systems. While initial prototypes show promise virtualization-based fault-tolerant architecture still experiences substantial performance overhead especially for data-intensive workloads. The main performance challenge of virtualization-based fault...

    Provided By Symantec

  • White Papers // Nov 2009

    7 Steps to Windows 7: Migrating With Altiris Deployment Solution 6.9 SP3 From Symantec

    Migrating to Microsoft Windows 7 can be an intimidating task. One want to take advantage of how Windows 7 will help make users productive anywhere with enhanced security and control, but how does one implement an efficient, cost-effective migration that doesn't disrupt end-user productivity? While challenging, migration also presents an...

    Provided By Symantec

  • White Papers // Sep 2010

    The Risks of Social Networking

    Social networks are an inherent part of today's Internet and used by more than a billion people worldwide. They allow people to share ideas and interact with other people, from old friends to strangers. This interaction reveals a lot of information, often including personal information visible to anyone who wants...

    Provided By Symantec

  • White Papers // Sep 2010

    The Rise of PDF Malware

    The PDF file format has become a popular file format since its release as an open standard. Its portable nature, extensive feature list, and availability of free tools to read and author them have made it a de facto standard for printable documents on the Web. As it gained more...

    Provided By Symantec

  • White Papers // Jun 2010

    Symantec is Windows 7 Migration

    By the end of 2010, almost 20 percent of the global IT workforce will be running Microsoft Windows 71 - taking advantage of productivity and connectivity features that promise to make it the world's preferred business operating system. Like any large-scale IT transformation, Windows 7 migration presents its share of...

    Provided By Symantec

  • White Papers // Jun 2009

    Automatic Generation of String Signatures for Malware Detection

    Scanning les for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware...

    Provided By Symantec

  • White Papers // Jan 2011

    Demystifying Virtualization for Small Businesses

    Virtualization is not new. Most businesses have heard about it and the rate of adoption has been growing rapidly for years. In fact, analysts predict the adoption rate of virtualization among small to medium-sized businesses will double in the next two years, making virtualization technology relatively mainstream. There are different...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec APJ Internet Security Threat Report Trends for 2008

    The Symantec APJ Internet Security Threat Report provides an annual overview and analysis of Internet threat activity, a review of known vulnerabilities, and highlights of malicious code in the Asia-Pacific/Japan (APJ) region. Trends in phishing and spam are also assessed. Previously, Symantec presented data on a six-month basis. This volume...

    Provided By Symantec