Symantec

Displaying 61 - 70 of 225 results

  • State of Privacy: The Data Trust Gap

    White Papers // Jul 2015 // provided by Symantec

    7000 people in Europe were asked about their feelings towards the privacy of their personal data. Learn More..

    Read more
  • Solution brief: implementing the right security strategy now

    White Papers // Jul 2015 // provided by Symantec

    Recent malware incidents have shown how costly and damaging cyber attacks can be: attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order to ...

    Read more
  • Symantec: Internet Security Threat Report 2015

    White Papers // Jul 2015 // provided by Symantec

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Learn more
  • EU General Data Protection Regulation (German)

    White Papers // Jul 2015 // provided by Symantec

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in ...

    Read more
  • EU General Data Protection Regulation (French)

    White Papers // Jul 2015 // provided by Symantec

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in ...

    Read more
  • EU General Data Protection Regulation (Dutch)

    White Papers // Jul 2015 // provided by Symantec

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in ...

    Read more
  • Internet Security Threat Report 2015

    Ebooks // Apr 2015 // provided by Symantec

    The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Key Findings: • ...

    Read more
  • Internet Security Threat Report 2015 - eGuide

    Ebooks // Apr 2015 // provided by Symantec

    This Annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant ...

    Download Now
  • Internet Security Threat Report 2015 - Key Findings

    White Papers // Apr 2015 // provided by Symantec

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code ...

    Download Now
  • Internet Security Threat Report 2015 - Infographic Path of a Cyberattacker

    White Papers // Apr 2015 // provided by Symantec

    2014 has been a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years. This report looks from the attacker's perspective to understand the path of their attacks. Download this report to learn more.

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?