Symantec

Displaying 201-240 of 428 results

  • Webcasts // Dec 2009

    Storage Management and Backup & Recovery: Best Practices for Microsoft Hyper-V Environments

    Virtualization introduces new requirements that affect IT business continuity such as backup, disaster recovery, and storage management. Ensuring rapid and reliable application and data recovery while controlling storage growth can be challenging as virtualization creates a whole new set of complexities. Symantec integrates with the leading virtualization platforms, including Microsoft...

    Provided By Symantec

  • White Papers // Dec 2009

    Selecting Your Hosted Security Provider: What Every IT Manager Needs to Know

    Overall hosted security services provide savings and improved protection on many fronts, and make good economic and technical sense for most businesses. At Symantec Hosted Services - MessageLabs, the hosted security solution is second to none when it comes to accuracy, support, technical depth and research, depth of threat analysis...

    Provided By Symantec

  • Webcasts // Dec 2009

    Backup and Recover Your VMware and Hyper-V Machines in Seconds

    Whether considering implementing a virtual environment or are already experiencing the benefits of virtualization, backing up and recovering the guest machines, files and folders in a virtual environment is a new challenge one have to solve. Symantec Backup Exec 12.5 allows companies to save time and cost associated with data...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • White Papers // Dec 2009

    Symantec Brightmail Anti Phishing

    In today's information driven world, cyber criminals are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. One method that is frequently employed is phishing, which the criminally fraudulent process of attempting to acquire sensitive information such...

    Provided By Symantec

  • White Papers // Dec 2009

    Anatomy of a Data Breach: Why Breaches Happen and What to Do About It

    For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. In fact, more electronic records were breached in 2008 than in the previous four years combined.1 this growth in...

    Provided By Symantec

  • White Papers // Nov 2009

    Zeus: King of Bots

    Zbot, also known as Zeus, is a malware package that is readily available for sale and also traded in underground forums. The package contains a builder that can generate a bot executable and Web server files (PHP, images, SQL templates) for use as the command and control server. While Zbot...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • White Papers // Nov 2009

    Social Networking: Safely Manage the Paradigm Shift and Leverage Its Full Potential

    The phenomenal growth and popularity of social media websites has created promising opportunities for businesses as well as dangerous new ways for cyber-criminals to create havoc on corporate networks. This white paper from Symantec Hosted Services, written especially for IT and Security Managers, illustrates the many ways in which social...

    Provided By Symantec

  • White Papers // Nov 2009

    Singapore: A Prime Target for Cyber-Crime

    Singapore's status as a leading financial and commercial hub has made it a prime target for Internet-borne threats that are endangering businesses worldwide. 2009 has seen an unwelcome surge in spam, viruses and targeted trojans heading for corporate gateways across Singapore. The danger they pose for Singapore now significantly exceeds...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec

  • Webcasts // Nov 2009

    Overview on SP1 Release for Storage Foundation and High Availability for Windows 5.1

    Storage Foundation and High Availability for Windows 5.1 will be releasing Service Pack 1 (SP1) in November. This SP1 release includes an eye-popping list of extended features and additional functionality that enables this product to maintain its competitive edge in the storage management and availability space for the Windows environment....

    Provided By Symantec

  • Webcasts // Nov 2009

    Get the Most Return From Your Backup Exec Investment

    Anyone on an older version of Backup Exec may be missing out on valuable backup and recovery advantages achieved by simply upgrading. Recent internal performance testing proves that by simply upgrading to the latest version of Backup Exec 12.5, one can experience a 50-100% increase in backup performance. Symantec Backup...

    Provided By Symantec

  • White Papers // Nov 2009

    Inside the Jaws of Trojan.Clampi

    While Trojan.Clampi's lineage can be traced back to 2005, only variants over the last year have evolved sufficiently enough to gain more notoriety. The main purpose of Clampi is to steal online banking credentials to conduct the unauthorized transfer of funds from hacked accounts to groups likely in Eastern Europe...

    Provided By Symantec

  • Webcasts // Nov 2009

    Mind the Gap: What 3rd Party Archiving Brings to Your Exchange Environment

    There are a lot of messages, storage, backups, policies, and people to manage just to maintain the current state of email and make sure it's accessible to those who need it, when they need it. Many organizations need more than the archiving functionality that will be available within Exchange 2010....

    Provided By Symantec

  • Webcasts // Nov 2009

    Windows Virtualization - Crossing the Data Protection Divide With NetBackup

    As more companies move to virtualization to control spiraling IT costs, virtual machines are taking on more mission-critical workloads as Microsoft Exchange, SQL, SharePoint, and Active Directory. Protecting such application, data, and storage-intensive environments takes on a whole new set of complexities, and typically requires a whole new set of...

    Provided By Symantec

  • Webcasts // Nov 2009

    Five Things You Wish You Knew Before You Virtualized

    The reality of deploying virtualization is that it can also increase the complexity and cost of managing the applications and servers. As Virtual Machines (VMs) proliferate - storage growth, data protection, and application and data recovery are just a few detours that can impact the business' bottom line. Without an...

    Provided By Symantec

  • White Papers // Nov 2009

    7 Steps to Windows 7: Migrating With Altiris Deployment Solution 6.9 SP3 From Symantec

    Migrating to Microsoft Windows 7 can be an intimidating task. One want to take advantage of how Windows 7 will help make users productive anywhere with enhanced security and control, but how does one implement an efficient, cost-effective migration that doesn't disrupt end-user productivity? While challenging, migration also presents an...

    Provided By Symantec

  • White Papers // Nov 2009

    Reliably Migrating Applications to Microsoft Windows 7 With Wise Package Studio Professional Edition From Symantec

    A critical, but often overlooked, step in the Microsoft Windows 7 migration process is determining if the organization's myriad of applications will successfully install to Windows 7. Without investing large amounts of time and expertise in manually installing and testing applications in a prototype Windows 7 environment, it's difficult to...

    Provided By Symantec

  • White Papers // Nov 2009

    Confidence in the Cloud: Five Ways to Capitalize With Symantec

    Cloud computing is gaining significant traction as a new IT delivery model with potential business and financial benefits. Because cloud computing is still relatively new, organizations are grappling with what this emerging delivery model is, what some of the potential barriers are, and how best to take advantage of it....

    Provided By Symantec

  • White Papers // Nov 2009

    Security and Privacy for Healthcare Providers

    As healthcare providers automate their medical records, clinical systems, and medical imaging, protecting the privacy of patient information and securing IT infrastructures is becoming increasingly challenging. Healthcare organizations are facing more security threats that increase the risks of inappropriate access to patient information, inability to access the information, and impaired...

    Provided By Symantec

  • White Papers // Nov 2009

    Database Storage Management With Veritas Storage Foundation by Symantec: Manageability, Availability, and Superior Performance for Databases

    Enterprises are required to manage a rapidly growing number of database-dependent applications and mission-critical database environments, often with stringent service level agreements and reduced operational budgets. The requirement for information availability has created an operational imperative to shrink database backup windows, recover more quickly from outages, and move non-critical, resource-intensive...

    Provided By Symantec

  • Webcasts // Oct 2009

    Why Breaches Happen... and What to Do About It

    For companies with critical information assets such as customer data, intellectual property and proprietary corporate data, the risk of a data breach is now higher than ever before. In order to reduce this risk, it is essential to understand why and how data breaches occur. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Oct 2009

    Announcing the Backup Exec 2010 Early Adopter Program - Dedupe Everywhere!

    Interested in learning more about the benefits of data deduplication? The next major release of Backup Exec coming later this year brings industry recognized deduplication technology (using NetBackup PureDisk technology). The attendee of this webcast will learn how to enroll in the upcoming early adopter program and the data reduction...

    Provided By Symantec

  • Webcasts // Oct 2009

    Symantec FileStore: Building a Foundation for Cloud Storage

    Cloud storage has the potential to change the economic cost curve for computer storage delivery. Lower product costs and reduced administrative effort make Cloud Storage attractive for both public cloud providers and enterprises considering a private cloud. Symantec FileStore delivers the benefits of Cloud, starting with a bridge from current...

    Provided By Symantec

  • Webcasts // Oct 2009

    Archiving and Information Management for Microsoft Exchange 2010

    As organizations eagerly anticipate the release of Microsoft Exchange 2010, experts from Symantec and Microsoft come together to discuss Exchange 2010 and key considerations for archiving Exchange and other Microsoft applications. Attend this webcast to learn how to make job easier around managing Exchange, storage, and E-Discovery matters.

    Provided By Symantec

  • Webcasts // Oct 2009

    High Availability and Disaster Recovery for Virtual Server Environments

    Companies are utilizing server virtualization to reduce hardware costs and increase agility, however deploying mission-critical applications in virtual machines brings new challenges. The attendee will gain a deeper understanding of the challenges to true high availability and some answers on how to achieve it.

    Provided By Symantec

  • White Papers // Oct 2009

    Eradicate Spam and Gain 100% Assurance of Clean Mailboxes

    Many great inventions have been used for substantial benefits and equal amounts of harm. This trend certainly applies to the Internet. While the medium has given the world a wealth of information that is instantly accessible with the click of a mouse, it has also spawned a breeding ground for...

    Provided By Symantec

  • Webcasts // Oct 2009

    Simplify, Automate, and Reduce the Cost of IT Asset Disposal With TechTurn's Retirement Solution

    The attendee of this webcast will learn about a new free plug-in for the Symantec Management Console called TechTurn Retirement Solution. TechTurn Retirement Solution extends the power of the Altiris management software by automating the often ignored "Last mile" in an asset's life. Now one can use the Symantec Management...

    Provided By Symantec

  • Webcasts // Oct 2009

    To Green or Not to Green. That Is the Question

    Green IT impacts costs, compliance, and customer perceptions, making it a top business priority for Executives across the world. The attendee will learn how the Renault F1 Team has successfully implemented Green IT initiatives, what they learned in the process, and what they are doing today to continue being green....

    Provided By Symantec

  • White Papers // Oct 2009

    The Bredolab Files

    Trojan.Bredolab is a downloader that acts as a carrier or installer for arbitrary threats. It may download a password stealer, bot, rootkit, backdoor, or a misleading application. Some of the well-known threats it has been observed downloading include Backdoor.Rustock, Trojan.Srizbi, Trojan.Fakeavalert, and W32.Waledac. Since Bredolab installs a random mixture of...

    Provided By Symantec

  • White Papers // Oct 2009

    eDiscovery Compliance and the New Requirements of IT: The IT Manager's Guide to 100% Compliance

    Through the implementation of a strategic eDiscovery compliance program, incorporating clearly written rules, formal employee education, and a proven-effective Hosted Service Archiving Solution, US and Canadian employers can quickly and cost-effectively preserve, protect, and produce legally compliant email and other Electronically Stored Information (ESI) when compelled to do so by...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec Backup Exec System Recovery 2010: Protect Against Business Downtime and Disaster With Rapid, Reliable Backup and Recovery

    Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small businesses that helps minimize downtime and avoid disaster by easily recovering data files or complete systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. New functionality in Backup Exec...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec White Paper - 7 Steps to Windows 7

    Symantec, a provider of security, storage, and systems management solutions, suggests seven steps that ensure smooth shift and sustained business value for migration to Windows 7. It discusses efficient, cost-effective, and sustainable migration steps for Windows 7 that is productive and secure. On-demand, user-based provisioning combined with standard configurations and...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec Report on Rogue Security Software

    The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the...

    Provided By Symantec

  • White Papers // Oct 2009

    7 Steps to Windows 7: Ensuring a Smooth Transition and Sustained Business Value From Your Windows 7 Migration

    Migrating to Microsoft Windows 7 can be intimidating. One wants to take advantage of new Windows 7 productivity, security, and control enhancements - but at this scale, how can one keep the migration efficient, cost-effective, and sustainable, while protecting end-user productivity? But the migration can be an opportunity as well...

    Provided By Symantec

  • White Papers // Sep 2009

    Symantec NetBackup PureDisk: Optimizing Backups With Deduplication for Remote Offices, Data Center and Virtual Machines

    Modern endeavours find themselves faced with the issue of fast paced growing data. In fact, data growth has been predicted to be in the range of 50-60% per year. But data, instead of being confined to a single centre, is often spread across multiple data centres, remote offices and virtual...

    Provided By Symantec

  • White Papers // Sep 2009

    A Survey of Voice Over IP Security Research

    It presents a survey of Voice over IP security research. Its goal is to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. It also briefly discuss the implications of findings with respect...

    Provided By Symantec

  • Webcasts // Sep 2009

    Dedupe - How to Be a Hero With NetBackup

    Do More With Less - how many times has management tasked to do that? Well with the NetBackup Platform one really can. With the data deduplication capabilities of NetBackup PureDisk one can protect more and store less - up to 8x more than other deduplication products on comparable server hardware....

    Provided By Symantec

  • White Papers // Mar 2009

    How Veritas Storage Foundation Complements Microsoft Windows Server: Enhancing the Data Center

    Microsoft introduced several new storage management features in Windows Server 2003. In Windows Server 2008, they extend functionality to include the ability to shrink partitions and volumes online and DSMs to configure multi-pathing in iSCSI and FC environments. This paper will outline how Veritas Storage Foundation for Windows integrates and...

    Provided By Symantec

  • Webcasts // Mar 2011

    Symantec Study: SMBs Not Prepared For Disasters, Don't Act Until It's Too Late

    Symantec's 2011 SMB Disaster Preparedness Survey found that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also revealed that disaster-related downtime costs a typical SMB $12,500 per day. Learn more about the survey findings...

    Provided By Symantec

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • Webcasts // Jan 2010

    Is Social Networking Foiling Your Security Practice?

    This educational webcast teaches how the attendee can "Go social" without going sleepless. Social networking is rapidly evolving into one of the biggest threats to data security out there today. But the reality is, this medium is also a great way for the employees to collaborate and communicate. The challenge...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce the Cost and Complexity of Compliance

    Is the regulatory compliance program costly and time-consuming? Is one having trouble providing ongoing support for audits? Does one have the resources to keep up with ever-changing regulations and industry standards? What about the overall IT risk posture?. Does one know if all the IT assets are properly protected? Can...

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • White Papers // Jun 2009

    Converged Threats on the Security Landscape

    The pervasive presence of malware on the Internet today creates more opportunities for mixing and matching dangerous content than has ever been possible. The essence of a converged threat is the combination of viruses, spyware, phishing, spam and other attempts at attack or exploitation of vulnerabilities that can disrupt networks...

    Provided By Symantec

  • Webcasts // Jan 2010

    Carve Out IT Budget Through Better Software Management

    Software is one of the more expensive components of an IT budget. Keeping track of who has the software, who pays for it, and who uses it can become very complex. Does one have to prepare for an upcoming software vendor audit? Is it the time to renew expensive software?...

    Provided By Symantec

  • Webcasts // Jan 2010

    Unified IT Security Management With Symantec Protection Center and Symantec Protection Suites

    Symantec Protection Center and Symantec Protection Suite introduce a new way organizations will realize the benefits of intelligent management and unified security solutions in today's complex IT infrastructures. Minimal insight into the threats the environment faces, slow responses to security incidents when they take place and a lack of automation...

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • White Papers // Sep 2009

    5 Steps Every Business Can Take to Guard Against Botnets

    Robot networks and zombie armies may sound like names from science fiction. Unfortunately, they identify actual threats to information systems across the globe. By secretly invading business Internet connections, hackers and spammers can download harmful software, including spyware and computer viruses, onto computers and laptops. These malicious programs turn ordinary...

    Provided By Symantec

  • White Papers // Jun 2009

    Automatic Generation of String Signatures for Malware Detection

    Scanning les for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware...

    Provided By Symantec

  • Webcasts // Jan 2010

    Effective Strategies for Domino Backup, Archiving, and Recovery

    Backup vs. Archiving? Recovery vs. Discovery? Which keeps the employees productive and which keeps the Legal department off one's back? In this webcast the presenter looks at backup, archiving, and recovery for the Domino environment. The presenter will discuss the business needs driving these areas as well as identify technical...

    Provided By Symantec

  • Webcasts // Jan 2012

    Symantec Data Loss Prevention for Mobile

    In this webcast, the presenter shares his enterprises need to protect confidential data wherever it resides - even on tablet computers like the iPad. The presenter also the uses of Symantec Data Loss Prevention for Mobile.

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Jan 2009

    Choosing a Cost-Effective Email Security Solution: In Turbulent Economic Times

    Managing a portfolio of IT projects is one of the most complex, costly and resource intensive activities that organizations face. In today's sluggish economy, many companies are facing IT budget cuts, which means it's essential to make every IT dollar stretch further. With a limited budget come limited resources to...

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2010

    Store Efficiently - Spend Less on Storage and Optimize What You Have

    Most organizations today are faced with the difficult challenge of managing explosive data growth. Adding to that challenge is the problem of poor storage utilization rates, which typically hover around 30-40% for most organizations. The end result is intense pressure on IT organizations to contain skyrocketing storage costs while dealing...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • White Papers // Oct 2012

    Phishing: How to protect your business?

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • Webcasts // Jan 2010

    Information Governance in the Cloud

    Despite widespread interest in adopting cloud computing technologies, many organizations are "Flying blind" with respect to making them secure, potentially putting their operations, intellectual property and customer information at risk. Sponsored by Symantec, Ponemon Institute, a leading privacy and information management research firm, independently conducted a national study, Flying Blind...

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • White Papers // Feb 2009

    New Web Threats in 2009

    The new web borne threats attacking business networks are more intense and sophisticated than ever. Techniques using rich media, open source platforms, web 2.0 collaboration tools; social networking sites and a host of emerging technologies expose networks to a new breed of web security threats. This paper provides an overview...

    Provided By Symantec

  • Webcasts // Jan 2012

    Email Spam Filter & Virus Protection Solution - Symantec.cloud

    In this webcast, the presenter asks how to keep one business safe? The presenter tells about Symantec.cloud Email Security services and its protect against email spam, viruses, phishing and other email threats via the cloud.

    Provided By Symantec

  • Webcasts // Jan 2010

    Ensuring 24 X 7 Data and Infrastructure Availability

    As businesses demand higher service levels and IT budgets remain flat, ensuring 24 x 7 data and infrastructure availability is not an easy task. Simply relying on people and manual recovery processes can be very risky in today's competitive business climate. Symantec addresses these issues with solutions that: Provide automatic...

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2010

    Top 10 Backup Mistakes in Virtual Environments? And How to Avoid Them!

    As enterprises embrace virtualization, their broader IT infrastructure is also shifting. One of the most significant areas of change is in how data and systems are protected. Common mistakes in data protection strategies for virtualized environments are costly and create business risks. Enterprises need to balance their backup strategies with...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Medical Image Storage Dilemma: Why Hosted Archiving Makes Sense

    Secure storage capacity and lowering costs - do these seem like mutually exclusive propositions in the healthcare industry? Most healthcare organizations can't keep adding storage capacity to keep up with their growing medical image archive. Exponential growth in image size and volume translates into more servers, and yet space in...

    Provided By Symantec

  • Webcasts // Mar 2009

    Do More With Less: A Healthcare Approach to Compliance Automation

    How to continue to protect sensitive information, spend less time and money on regulatory audit, and maintain operational excellence while dealing with flat or even declining IT budgets? The attendee will learn key strategies to mitigate risk, cut audit costs, and improve compliance efficiency as organizations head into 2009. The...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • Webcasts // Mar 2009

    Windows Disaster Recovery That's Affordable and Simple

    Disaster Recovery is often thought of as a complicated, time consuming and very costly process. As a result it's an IT project that often gets delayed in many organizations. But with Symantec Backup Exec System Recovery, one can implement a disaster recovery solution for the Windows environment that's cost effective,...

    Provided By Symantec

  • Webcasts // Dec 2008

    Effective Security Operations Management Utilizing a Combination of Global Security Intelligence, Managed Security Services and Dedicated Security Professionals

    Security operations management is increasingly challenging for corporations due to increasing threats, multiple technologies, difficulties in attracting, training and retaining skilled staff, expanding regulatory scopes, and budget constraints. Many organizations have technology and services that provide insight into malicious activity, however, they often lack an effective framework for responding to...

    Provided By Symantec

  • Case Studies // Jan 2010

    Mitigating Against Security Risks and Ensuring IT Compliance - All at Reduced Cost

    It doesn't matter how fast a financial services organization is growing, how many new services are being introduced, or how quickly new customers are coming on board. One theme remains of paramount importance: reducing IT risk and achieving compliance objectives. For Abu Dhabi Commercial Bank (ADCB) these same principles apply,...

    Provided By Symantec

  • Webcasts // Dec 2008

    Protecting Microsoft SQL With Veritas NetBackup

    Microsoft SQL Server has become a vital application for many businesses. Veritas NetBackup has many ways to protect SQL Server of all shapes and sizes. Everything from keeping transaction logs in check, automated script execution, performing checkpoint restarts, controlling snapshots, as well as providing a dedicated interface for Database Adminstrators....

    Provided By Symantec

  • White Papers // Jan 2009

    Reinventing IT in Troubling Times

    Today, IT is on the cusp of innovation more so than any time in the last 10 years. These changes coincide with the advent of new period of economic instability that will require IT organizations to rely more on an integrated systems management framework. Symantec is committed to providing customers...

    Provided By Symantec