Symantec

Displaying 201-240 of 533 results

  • Webcasts // Jan 2010

    Is Social Networking Foiling Your Security Practice?

    This educational webcast teaches how the attendee can "Go social" without going sleepless. Social networking is rapidly evolving into one of the biggest threats to data security out there today. But the reality is, this medium is also a great way for the employees to collaborate and communicate. The challenge...

    Provided By Symantec

  • White Papers // Jan 2010

    A Practical Approach to Information Management

    Information is the fundamental connecting fabric of businesses today. Businesses rely on information technology and systems to run their business and help to drive new opportunities, as well as to operate efficiently and comply with corporate governance practices and industry regulations. Yet most organizations today are not organized around information,...

    Provided By Symantec

  • Webcasts // Jan 2010

    Securing 2010: Perspectives From Industry Security Bloggers

    With trends such as the rise of polymorphic threats, an increase in reputation hijacking and the vast propagation of rogue security software, 2009 made a mark with its fair share of malicious activity. However, new trends in the industry offered encouragement to security administrators as the year came to a...

    Provided By Symantec

  • Webcasts // Jan 2010

    Announcing Backup Exec 2010: Protect More, Store Less, Save More

    If one is like most growing companies, one is facing an increased challenge to backup all the data while keeping storage costs under control. Would one like to improve the backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Hydraq Attack Update - Ensure Your Organization Is Secure

    Hydraq (aka "Aurora") is the latest high profile security incident to hit the news. Hydraq is a targeted attack that is also currently referred to as Aurora, Google Attacks, and the Microsoft IE Vulnerability. Through the exploitation of a vulnerability, it attempts to install a trojan on a specific computer...

    Provided By Symantec

  • Webcasts // Jan 2010

    Get Leaner and More Resilient With the New Storage Foundation and Veritas Cluster Server 5.1 Release

    The attendee of this webcast learns about the recent 5.1 launch of Veritas Storage Foundation, Veritas Cluster File System and Veritas Cluster Server, Symantec's industry-leading heterogeneous storage management and high availability solutions. This webcast will cover new capabilities that will help the attendee optimize storage resources and reduce downtime: Considering...

    Provided By Symantec

  • Webcasts // Jan 2010

    Addressing the Root Causes of Inefficiency in Data

    Creating efficiency is a top concern for IT organizations - especially for mid-sized businesses that may be resource-constrained. In the wake of a tough 2009 economy and unprecedented data growth, IT organizations are seeking ways to introduce improvements that deliver time and cost savings, and drive higher service levels for...

    Provided By Symantec

  • Webcasts // Jan 2010

    Cut Storage Costs in Your Virtual World

    There's little question that virtualization is the single biggest game-changing trend in IT today. But virtualization can make information management more complex as well as increase storage consumption and costs. What can prevent one from fully realizing the promise of virtualization lies in poorly utilized or managed storage and an...

    Provided By Symantec

  • Webcasts // Jan 2010

    Protect More, Store Less by Upgrading to Symantec Backup Exec 2010

    If one likes most growing companies, one is facing an increased challenge to backup all their data while keeping storage costs under control. How can one improve the Backup Exec backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec NetBackup 7

    The new release of Symantec NetBackup 7 is redefining best-in-class enterprise data protection with advanced technology features that help customers tackle some of the major information management challenges facing today's enterprise IT environments - from the data center to global and remote offices: uncontrolled backup storage growth.

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec's 2010 State of the Data Center Study

    Now in its third year, Symantec's 2010 State of the Data Center study is a yearly report that highlights trends regarding data centers in companies worldwide. Conducted by Applied Research, the 2010 survey is based on input from 1,780 data center managers in 26 countries in November 2009. For the...

    Provided By Symantec

  • Webcasts // Dec 2009

    Automate Your Security Awareness Training

    Research shows that the single most important cause of data breaches is the inadvertent violation of basic information security precautions by well-meaning employees. Whether it is storing confidential data unencrypted on a removable device that may be lost or stolen - or simply sharing proprietary information in a crowded elevator...

    Provided By Symantec

  • White Papers // Dec 2009

    A Museum of API Obfuscation on Win32

    Antivirus software vendors attempt to identify threats by unpacking suspicious samples and hence aim to produce as many unpackers as possible. When characteristic portions of a successfully unpacked sample are identified, the sample can be tagged and detection added. This procedure is commonly used for variants of well-known malware families...

    Provided By Symantec

  • Webcasts // Dec 2009

    Optimize Your Storage - Storage Resource Management in VMware Environments With Veritas CommandCentral

    With physical storage now separated by two or more degrees from the logical storage an application consumes, traditional storage management approaches are no longer valid. The task of understanding and optimizing resources that applications depend on - which now traverses the virtualization layer - can be a daunting one for...

    Provided By Symantec

  • Webcasts // Dec 2009

    Storage Management and Backup & Recovery: Best Practices for Microsoft Hyper-V Environments

    Virtualization introduces new requirements that affect IT business continuity such as backup, disaster recovery, and storage management. Ensuring rapid and reliable application and data recovery while controlling storage growth can be challenging as virtualization creates a whole new set of complexities. Symantec integrates with the leading virtualization platforms, including Microsoft...

    Provided By Symantec

  • White Papers // Dec 2009

    Selecting Your Hosted Security Provider: What Every IT Manager Needs to Know

    Overall hosted security services provide savings and improved protection on many fronts, and make good economic and technical sense for most businesses. At Symantec Hosted Services - MessageLabs, the hosted security solution is second to none when it comes to accuracy, support, technical depth and research, depth of threat analysis...

    Provided By Symantec

  • Webcasts // Dec 2009

    Backup and Recover Your VMware and Hyper-V Machines in Seconds

    Whether considering implementing a virtual environment or are already experiencing the benefits of virtualization, backing up and recovering the guest machines, files and folders in a virtual environment is a new challenge one have to solve. Symantec Backup Exec 12.5 allows companies to save time and cost associated with data...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • White Papers // Dec 2009

    Symantec Brightmail Anti Phishing

    In today's information driven world, cyber criminals are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. One method that is frequently employed is phishing, which the criminally fraudulent process of attempting to acquire sensitive information such...

    Provided By Symantec

  • White Papers // Dec 2009

    Anatomy of a Data Breach: Why Breaches Happen and What to Do About It

    For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. In fact, more electronic records were breached in 2008 than in the previous four years combined.1 this growth in...

    Provided By Symantec

  • White Papers // Dec 2009

    Symantec Backup Exec 2010: Addressing the Root Causes of Inefficiency in Data Protection

    The continued upward trending of data growth, spending cuts driven by current economic factors, and pressure to meet increasingly inflexible service level agreements (SLAs) continue to beleaguer IT organizations. With data protection processes, IT is challenged to deliver cost and time savings while maintaining or improving backup and recovery SLAs?an...

    Provided By Symantec

  • White Papers // Nov 2009

    Zeus: King of Bots

    Zbot, also known as Zeus, is a malware package that is readily available for sale and also traded in underground forums. The package contains a builder that can generate a bot executable and Web server files (PHP, images, SQL templates) for use as the command and control server. While Zbot...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • White Papers // Nov 2009

    Social Networking: Safely Manage the Paradigm Shift and Leverage Its Full Potential

    The phenomenal growth and popularity of social media websites has created promising opportunities for businesses as well as dangerous new ways for cyber-criminals to create havoc on corporate networks. This white paper from Symantec Hosted Services, written especially for IT and Security Managers, illustrates the many ways in which social...

    Provided By Symantec

  • White Papers // Nov 2009

    Singapore: A Prime Target for Cyber-Crime

    Singapore's status as a leading financial and commercial hub has made it a prime target for Internet-borne threats that are endangering businesses worldwide. 2009 has seen an unwelcome surge in spam, viruses and targeted trojans heading for corporate gateways across Singapore. The danger they pose for Singapore now significantly exceeds...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec

  • Webcasts // Nov 2009

    Overview on SP1 Release for Storage Foundation and High Availability for Windows 5.1

    Storage Foundation and High Availability for Windows 5.1 will be releasing Service Pack 1 (SP1) in November. This SP1 release includes an eye-popping list of extended features and additional functionality that enables this product to maintain its competitive edge in the storage management and availability space for the Windows environment....

    Provided By Symantec

  • White Papers // Nov 2009

    Inside the Jaws of Trojan.Clampi

    While Trojan.Clampi's lineage can be traced back to 2005, only variants over the last year have evolved sufficiently enough to gain more notoriety. The main purpose of Clampi is to steal online banking credentials to conduct the unauthorized transfer of funds from hacked accounts to groups likely in Eastern Europe...

    Provided By Symantec

  • Webcasts // Nov 2009

    Get the Most Return From Your Backup Exec Investment

    Anyone on an older version of Backup Exec may be missing out on valuable backup and recovery advantages achieved by simply upgrading. Recent internal performance testing proves that by simply upgrading to the latest version of Backup Exec 12.5, one can experience a 50-100% increase in backup performance. Symantec Backup...

    Provided By Symantec

  • Webcasts // Nov 2009

    Mind the Gap: What 3rd Party Archiving Brings to Your Exchange Environment

    There are a lot of messages, storage, backups, policies, and people to manage just to maintain the current state of email and make sure it's accessible to those who need it, when they need it. Many organizations need more than the archiving functionality that will be available within Exchange 2010....

    Provided By Symantec

  • Webcasts // Nov 2009

    Windows Virtualization - Crossing the Data Protection Divide With NetBackup

    As more companies move to virtualization to control spiraling IT costs, virtual machines are taking on more mission-critical workloads as Microsoft Exchange, SQL, SharePoint, and Active Directory. Protecting such application, data, and storage-intensive environments takes on a whole new set of complexities, and typically requires a whole new set of...

    Provided By Symantec

  • Webcasts // Nov 2009

    Five Things You Wish You Knew Before You Virtualized

    The reality of deploying virtualization is that it can also increase the complexity and cost of managing the applications and servers. As Virtual Machines (VMs) proliferate - storage growth, data protection, and application and data recovery are just a few detours that can impact the business' bottom line. Without an...

    Provided By Symantec

  • White Papers // Nov 2009

    Reliably Migrating Applications to Microsoft Windows 7 With Wise Package Studio Professional Edition From Symantec

    A critical, but often overlooked, step in the Microsoft Windows 7 migration process is determining if the organization's myriad of applications will successfully install to Windows 7. Without investing large amounts of time and expertise in manually installing and testing applications in a prototype Windows 7 environment, it's difficult to...

    Provided By Symantec

  • White Papers // Nov 2009

    Confidence in the Cloud: Five Ways to Capitalize With Symantec

    Cloud computing is gaining significant traction as a new IT delivery model with potential business and financial benefits. Because cloud computing is still relatively new, organizations are grappling with what this emerging delivery model is, what some of the potential barriers are, and how best to take advantage of it....

    Provided By Symantec

  • White Papers // Nov 2009

    Security and Privacy for Healthcare Providers

    As healthcare providers automate their medical records, clinical systems, and medical imaging, protecting the privacy of patient information and securing IT infrastructures is becoming increasingly challenging. Healthcare organizations are facing more security threats that increase the risks of inappropriate access to patient information, inability to access the information, and impaired...

    Provided By Symantec

  • White Papers // Nov 2009

    Database Storage Management With Veritas Storage Foundation by Symantec: Manageability, Availability, and Superior Performance for Databases

    Enterprises are required to manage a rapidly growing number of database-dependent applications and mission-critical database environments, often with stringent service level agreements and reduced operational budgets. The requirement for information availability has created an operational imperative to shrink database backup windows, recover more quickly from outages, and move non-critical, resource-intensive...

    Provided By Symantec

  • White Papers // Nov 2009

    7 Steps to Windows 7: Migrating With Altiris Deployment Solution 6.9 SP3 From Symantec

    Migrating to Microsoft Windows 7 can be an intimidating task. One want to take advantage of how Windows 7 will help make users productive anywhere with enhanced security and control, but how does one implement an efficient, cost-effective migration that doesn't disrupt end-user productivity? While challenging, migration also presents an...

    Provided By Symantec

  • Case Studies // Nov 2009

    Cybersecurity Report on Small Business

    An online survey revealed that while U.S. small businesses rely heavily on the Internet and routinely handle confidential and proprietary data, many lack the internal resources, formal policies, employee training, and technologies they need to protect their critical information. Download the survey results and get five tips for building a...

    Provided By Symantec

  • Webcasts // Oct 2009

    Why Breaches Happen... and What to Do About It

    For companies with critical information assets such as customer data, intellectual property and proprietary corporate data, the risk of a data breach is now higher than ever before. In order to reduce this risk, it is essential to understand why and how data breaches occur. The attendee of this webcast...

    Provided By Symantec

  • White Papers // Apr 2009

    Five Critical Recovery Flaws Your Last Disaster Recovery Test Missed

    Businesses today are spending millions of dollars to develop and maintain Disaster Recovery (DR) infrastructures that will ensure business continuity. But despite such huge investments of time and resources, most IT professionals are still not completely confident in their ability to recover in an emergency. This paper examines how automated...

    Provided By Symantec

  • Webcasts // Jan 2009

    Spam, Botnets and Spyware - An Overview of the Current Threat Landscape

    The presenter of this webcast will discuss what to look out for next in terms of spam attacks against the network. With a consistently evolving threat landscape, it becomes imperative to stay aware of the latest risks that the company faces. The presenter will cover the latest threats from a...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • Webcasts // Jan 2009

    Are Spyware and Phishing Secretly Compromising Your Network?

    Spyware and phishing are quickly becoming the most costly online threats for organizations across all industries. In fact, by 2010, 70% of all IT security incidents will be spyware-related. By using a managed service, the organization will no longer need to worry about malicious attacks infiltrating the network. By stopping...

    Provided By Symantec

  • White Papers // Mar 2009

    How Veritas Storage Foundation Complements Microsoft Windows Server: Enhancing the Data Center

    Microsoft introduced several new storage management features in Windows Server 2003. In Windows Server 2008, they extend functionality to include the ability to shrink partitions and volumes online and DSMs to configure multi-pathing in iSCSI and FC environments. This paper will outline how Veritas Storage Foundation for Windows integrates and...

    Provided By Symantec

  • White Papers // Jul 2009

    Containing an Outbreak: How to Clean Your Network After an Incident

    It's not the sort of statement want to hear in regards to network. Whether a network admin plans a containment strategy or an executive assessing the damage done, one knows that such situations cost time and money to resolve. Determining where to start can be equally as frustrating, especially when...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation for Windows

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • White Papers // Sep 2008

    Fast and Simple Recovery of Your Critical Microsoft Applications With Symantec Backup Exec

    Companies today face the ever-increasing challenge of managing the explosive growth of valuable data. Symantec Backup Exec 12.5 for Windows Servers is the gold standard in Windows data protection, providing cost-effective, high-performance, disk-to-disk-to-tape backup and recovery. Continuous data protection for Microsoft applications, including Exchange, SQL, Active Directory, and SharePoint, helps...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • White Papers // Apr 2009

    Enterprise Vault 8.0: Technical Overview

    Unstructured content like email and files are a huge management problem for companies of all sizes. The growth of this information in the form of email and files on storage devices and frontline servers are causing headaches as companies attempt to manage IT risk but maximize performance. This whitepaper has...

    Provided By Symantec

  • White Papers // Aug 2008

    Taking Data Protection to the Next Level

    Today's businesses must keep their infrastructures up and running 24x7. They must also be able to access steadily increasing amounts of information - anytime and anywhere. That means that the physical systems, the operating environments, and the applications must be protected across all tiers of the infrastructure. Symantec continues to...

    Provided By Symantec

  • White Papers // May 2009

    Managed Outcome: A New Paradigm for IT Departments

    A real-world example of the benefits of the Managed Outcome model is offered by Forrester Research According to Forrester, "A successful transition to a Managed Outcome relationship typically yields an additional 20% to 30% savings improvement" beyond typical expectations from outsourcing technical staff. Forrester adds that other key benefits of...

    Provided By Symantec

  • White Papers // May 2009

    Symantec: Malicious Code Activity Spiked in 2008

    As malicious code continues to grow at a record pace, attackers are shifting away from the mass distribution of a few threats to the micro-distribution of millions of distinct threats. Moreover, these cybercriminals are intent upon distributing threats that steal confidential information, particularly bank account credentials and credit card data.

    Provided By Symantec

  • White Papers // Jan 2009

    What the Latest Symantec Threat Report Means to SMBs

    As the latest Symantec Internet Security Threat Report amply demonstrates, malicious code activity grew at a record pace in 2008, and confidential information was its primary target. The report, which provides a global view of the state of Internet security, shows that there, continues to be a well-organized underground economy...

    Provided By Symantec

  • White Papers // Jan 2009

    Superior Protection for the Windows Environment

    Today most small and midsize organizations rely on Microsoft Windows to run their business and keep their employees productive. And each day, these organizations have to protect against viruses and other malware, back up and recover mission-critical data and systems, and manage their Windows environment to keep everything running smoothly....

    Provided By Symantec

  • White Papers // Jan 2009

    The Value of Security Suites

    While the recent shutdown of systems hosted by McColo was a milestone in the war against spam, the shutdown was little more than a short-term obstacle for spammers. As the threat landscape continues to evolve, small and midsize businesses need to stay vigilant and informed. By gaining a greater awareness...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • White Papers // Feb 2009

    Protection You Can Count On

    For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company's bottom line if that data isn't protected. SMBs should...

    Provided By Symantec

  • White Papers // Jan 2009

    Improve Your System Recovery Times

    It's no exaggeration to say that businesses today require more from their Microsoft Windows systems than ever before. That's partly due to the explosive rise in data volumes. But it's also due to the very nature of today's 24x7 business environment. Whatever the cause, the demand for system availability has...

    Provided By Symantec

  • Webcasts // Feb 2009

    How to Do More With Less When Protecting Microsoft Exchange With Veritas NetBackup

    With everyone being asked to do more with less why shouldn't the backup application be asked the same? Symantec's Granular Recovery Technology eliminates MAPI backups and allows for the quick recovery of individual email messages and the entire application. The attendee will learn how to shorten the recovery time, backup...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Server Management Suite 7.0

    With the launch of Altiris Server Management Suite 7.0, Symantec supplies the essentials for server management. The attendee will learn about the new and exciting features for servers from the new approach to server monitoring and enhanced proven technologies in server inventory to device discovery, server provisioning, and software and...

    Provided By Symantec

  • Webcasts // Mar 2009

    NEW Backup Exec Infrastructure Manager 12.5 - Managing Your Backup Exec Environment With Ease

    The presenter of this webcast gives a technical overview and demonstration of the NEW Backup Exec Infrastructure Manager 12.5, the latest addition to the Backup Exec family. Backup Exec Infrastructure Manager (powered by Altiris technology) delivers great benefits, simplifying the automation, deployment, and updating, upgrades, and licenses management of Backup...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Client Management Suite 7.0

    With the release of Altiris Client Management Suite 7.0, Symantec ushers in a new generation of client systems management. The presenter of this webcast shows some of the new and exciting features such as intelligent software management, integrated Cast of All Star technologies, power management, Windows, Mac and Linux support,...

    Provided By Symantec

  • Webcasts // Mar 2009

    Storage Strategy for a Down Economy: Stop Buying Storage!

    Unlocking the "Hidden" storage capacity in most data centers may allow data center managers to avoid capacity upgrades for a year or more. The presenter of this webcast will provide a four-step prescription for identifying available capacity and utilizing it effectively. Moreover, this is not a stop-gap program but rather...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Disaster Preparedness for Small Businesses: IT Strategies

    Small business requirements for IT solutions differ substantially from those of large businesses. A good IT solution provides contingent capacity, is simple and easy to operate. The presenter of this webcast discusses the vulnerabilities and threats that most directly affect the business. The presenter will share her recommendations for an...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • Webcasts // Mar 2009

    Windows Disaster Recovery That's Affordable and Simple

    Disaster Recovery is often thought of as a complicated, time consuming and very costly process. As a result it's an IT project that often gets delayed in many organizations. But with Symantec Backup Exec System Recovery, one can implement a disaster recovery solution for the Windows environment that's cost effective,...

    Provided By Symantec

  • Webcasts // Mar 2009

    Do More With Less: A Healthcare Approach to Compliance Automation

    How to continue to protect sensitive information, spend less time and money on regulatory audit, and maintain operational excellence while dealing with flat or even declining IT budgets? The attendee will learn key strategies to mitigate risk, cut audit costs, and improve compliance efficiency as organizations head into 2009. The...

    Provided By Symantec

  • Webcasts // Jan 2009

    Symantec Log Management Service: Capture Log Files, Respond to Threats and Address Growing Compliance Demands

    IT risk and compliance demands are heightening the need for a security approach that delivers comprehensive security monitoring and real-time incident alerting that expands support beyond networks to include critical servers, applications and end points, compliance reporting that eases administrative burdens and can accommodate custom reporting needs and flexible archive...

    Provided By Symantec

  • Webcasts // Dec 2008

    Effective Security Operations Management Utilizing a Combination of Global Security Intelligence, Managed Security Services and Dedicated Security Professionals

    Security operations management is increasingly challenging for corporations due to increasing threats, multiple technologies, difficulties in attracting, training and retaining skilled staff, expanding regulatory scopes, and budget constraints. Many organizations have technology and services that provide insight into malicious activity, however, they often lack an effective framework for responding to...

    Provided By Symantec

  • Webcasts // Dec 2008

    Protecting Microsoft SQL With Veritas NetBackup

    Microsoft SQL Server has become a vital application for many businesses. Veritas NetBackup has many ways to protect SQL Server of all shapes and sizes. Everything from keeping transaction logs in check, automated script execution, performing checkpoint restarts, controlling snapshots, as well as providing a dedicated interface for Database Adminstrators....

    Provided By Symantec

  • Webcasts // Dec 2008

    Tolly Group Findings for Symantec Endpoint Protection 11.0

    Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership. Symantec Corporation commissioned The Tolly Group...

    Provided By Symantec

  • Webcasts // Dec 2008

    Really Fast Failover and Other Use Cases for Veritas Cluster File System

    The presenter of this webcast will cover key uses cases for Veritas Storage Foundation Cluster File System. Attendees will learn how CFS delivers fast failover of databases and applications, highly available shared data access, scale-out file serving, storage consolidation and saving time and space in workflow applications.

    Provided By Symantec

  • Webcasts // Dec 2008

    Technical Overview of the Upcoming Veritas Storage Foundation HA 5.1 for Windows Application Pack 1 Release

    The presenter of this webcast will give an overview of what is included in the Application Pack 1 release for SFWHA 5.1, which includes Microsoft SQL 2008 integrated snapshot support and a new Veritas Cluster Server agent for Microsoft SQL 2008. Attendees will learn about the latest support and features...

    Provided By Symantec

  • Webcasts // Nov 2008

    Managing Change With CommandCentral Storage Change Manager

    Change is the root cause of instability and has impact on availability and compliance. IT administrators require a single tool that provides visibility into the changes happening in the storage arrays, the SAN and the server domain. To address these challenges, Symantec is introducing Veritas CommandCentral Storage Change Manager (SCM),...

    Provided By Symantec

  • Webcasts // Nov 2008

    Introducing Symantec Brightmail Gateway V8.0 (Formerly Mail Security 8300 Series) and Multi-Tier Protection: Starve Spammers and Protect Sensitive Information Against Data Loss

    Symantec Brightmail Gateway (formerly Mail Security 8300 Series) offers enhanced sender reputation technology and improved management features to deliver three key value propositions: Comprehensive inbound protection across email and IM, with effective and accurate antispam and antivirus protection; Outbound control, implementing advanced content filtering and data loss prevention technologies to...

    Provided By Symantec

  • Webcasts // Nov 2008

    Storage Foundation for Windows and High Availability 5.1

    The attendee will learn how Veritas Storage Foundation and High Availability Solutions for Windows (SFW HA) 5.1 helps provide maximum availability for mission critical Windows applications while reducing cost and complexity. The attendee will learn about the various sources of risk that expose the applications to downtime and how one...

    Provided By Symantec

  • Webcasts // Nov 2008

    NetBackup Solutions for VMware: Superior Virtual Data Protection, Granular Restore and Integrated Deduplication

    Virtualization is a "Mega trend". The benefits of virtualizing the environment are many, but with those benefits come challenges. It is critical to choose the right data protection solution, one that is complete, one that not only protects the physical world, but is also finely tuned for the virtual world....

    Provided By Symantec

  • Webcasts // Nov 2008

    Optimize Your VMware Infrastructure With the New Releases From the Symantec Backup Exec Family

    Planning to implement VMware or currently evaluating a virtualization strategy? There are many benefits to virtualizing a server environment but one of the challenges is how to efficiently backup and recover the critical data distributed across a virtual infrastructure. The new releases from the Symantec Backup Exec Family - Symantec...

    Provided By Symantec