Symantec

Displaying 281-317 of 317 results

  • Webcasts // Jul 2009

    Secure and Manage the Endpoint With Altiris Client Management Suite

    90% of incidents would not have happened if the endpoints simple had the appropriate patch installed? Good systems management is key to protecting the systems from vulnerabilities. The attendee will learn how to configure and protect the endpoint using Altiris Client Management Suite. This industry-leading product will help as an...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jul 2009

    The Economics of Green IT: Start Saving Money

    CIOs pay millions of dollars a year to power and cool data centers. Many enterprises, some for the first time this year, have shifted the energy bill from facilities to IT, with the hope - and expectation - that IT can lower energy costs. In addition, many enterprises seek to...

    Provided By Symantec

  • Webcasts // Jul 2009

    Put Data Storage on a Diet With Symantec Deduplication

    If there's one absolute in business, it's that data will continue to grow. Organizations of all sizes around the world wrestle with an ever-growing array of information management headaches, storage concerns and recovery needs. And increasingly, organizations are turning to data deduplication to address these issues. But how one will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • White Papers // Jul 2009

    Stealthy Deployment and Execution of In-Guest Kernel Agents

    As more and more Virtual Machines (VM) are packed into a physical machine, refactoring common kernel components shared by virtual machines running on the same physical machine could significantly reduce the overall resource consumption. The refactored kernel component typically runs on a special VM called a virtual appliance. Because of...

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • White Papers // Jun 2009

    Automatic Generation of String Signatures for Malware Detection

    Scanning les for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Case Studies // May 2009

    Leading Express Delivery Service Provider Automates System Administration With Symantec

    Every night, DHL processes more than 1,500 metric tons of freight at its hub in Leipzig. This volume demands a stable IT infrastructure that administrators can manage efficiently from a central location. The DHL Hub Leipzig GmbH does this with the help of a Symantec solution which is used to...

    Provided By Symantec

  • Webcasts // May 2009

    Competitive Analysis of Performance Impact of Endpoint Security Solutions for Small Businesses

    In small businesses with limited budgets for hardware upgrades, it is important that security software does not significantly impact computer performance. The presenter of this webcast gives the findings of a comprehensive performance comparison which includes 7 vendors, 44 test scenarios, and over 2000 individual test runs. The test concentrated...

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Server Management Suite 7.0

    With the launch of Altiris Server Management Suite 7.0, Symantec supplies the essentials for server management. The attendee will learn about the new and exciting features for servers from the new approach to server monitoring and enhanced proven technologies in server inventory to device discovery, server provisioning, and software and...

    Provided By Symantec

  • Webcasts // Mar 2009

    NEW Backup Exec Infrastructure Manager 12.5 - Managing Your Backup Exec Environment With Ease

    The presenter of this webcast gives a technical overview and demonstration of the NEW Backup Exec Infrastructure Manager 12.5, the latest addition to the Backup Exec family. Backup Exec Infrastructure Manager (powered by Altiris technology) delivers great benefits, simplifying the automation, deployment, and updating, upgrades, and licenses management of Backup...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • Webcasts // Feb 2009

    Top 7 Backup Mistakes to Avoid in Windows Environment

    There are several common backup/restore mistakes that could be costing the money and even putting the business data at risk. The attendee will learn how Backup Exec for Windows 12.5 and Backup Exec System Recovery 8.5 can help to avoid these common backup mistakes in Windows environments.

    Provided By Symantec

  • White Papers // Feb 2009

    Web Based Attacks

    Technology growth on the Web has changed the way businesses and consumers communicate and interact with each other. The Web has become a staple for information sharing and commercial transactions. At the same time it has also become complex, without boundaries and immediate in its nature. A single Web page...

    Provided By Symantec

  • Webcasts // Jan 2009

    Symantec Log Management Service: Capture Log Files, Respond to Threats and Address Growing Compliance Demands

    IT risk and compliance demands are heightening the need for a security approach that delivers comprehensive security monitoring and real-time incident alerting that expands support beyond networks to include critical servers, applications and end points, compliance reporting that eases administrative burdens and can accommodate custom reporting needs and flexible archive...

    Provided By Symantec

  • White Papers // Jan 2009

    Reinventing IT in Troubling Times

    Today, IT is on the cusp of innovation more so than any time in the last 10 years. These changes coincide with the advent of new period of economic instability that will require IT organizations to rely more on an integrated systems management framework. Symantec is committed to providing customers...

    Provided By Symantec

  • White Papers // Jan 2009

    IT Budget Strategy in a Down Economy: Stop Buying Storage!

    The current recessionary economic cycle has introduced a great deal of uncertainty into the business climate. Organizations are reluctant to spend any more money than absolutely necessary, which has limited or delayed the acquisition of IT equipment that otherwise, might have been routine. Forecasts vary widely for the depth and...

    Provided By Symantec

  • Resource Center // Jan 2009

    Symantec Backup Exec Challenge

    Symantec invites you to take the Backup Exec? Challenge. Answer six questions to receive an analysis of how your current backup solution compares to Symantec Backup Exec 12.5 and Symantec Backup Exec System Recovery 8.5.

    Provided By Symantec

  • White Papers // Jan 2009

    Best Practice for NDMP Backup Veritas NetBackup

    Many customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their Network Attached Storage (NAS) servers. Most NAS vendors and data protection providers (such as Symantec) have multiple options for protecting the NAS environment. This paper will help to make sense...

    Provided By Symantec

  • White Papers // Dec 2008

    NetBackup Architecture Overview

    The purpose of this paper is to provide an overview of the requirements for a basic NetBackup architecture to help customers understand which components are required in a data protection solution. Where possible, an example of a component will be noted; however, that component could be swapped for a similar...

    Provided By Symantec

  • Webcasts // Sep 2008

    Learn How Symantec Business Critical Services (BCS) Can Minimize Downtime and Ensure You Receive Maximum Value From Your Symantec Investment

    The attendee of this webcast will learn more about how Business Critical Services was designed for enterprises such as that have minimal tolerance for service interruptions. The attendee will also learn about the range of options available; from the highest levels of responsiveness to personalized and proactive services that are...

    Provided By Symantec

  • Webcasts // Jul 2008

    IT Analytics for Symantec Endpoint Protection - Uncover New Ways to More Effectively Manage and Secure Your Environment

    The attendee will learn how the new IT Analytics Symantec Endpoint Protection Pack will provide enhanced visibility into the health of the environment, allowing to make strategic decisions to combat potential security threats. The IT Analytics Symantec Endpoint Protection Pack is an advanced reporting solution that leverages business intelligence capabilities...

    Provided By Symantec

  • Webcasts // Jun 2008

    Symantec Endpoint Protection 11.0 - Benefits of Upgrading

    This webcast will present the benefits of upgrading to Symantec Endpoint Protection 11.0. Symantec Endpoint Protection threat prevention technologies present users with the optimum balance between security needs, administrative overhead and system impact. The webcast will focus on the advantages of the Symantec Endpoint Protection 11.0 management architecture, the required...

    Provided By Symantec

  • Downloads // Jun 2008

    Symantec Backup Exec System Recovery Server Edition

    Symantec Backup Exec System Recovery 8 restores systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. Backup Exec System Recovery 8 now includes: flexible offsite protection to an FTP location or secondary disk; granular recovery of Microsoft Exchange and SharePoint documents or files and...

    Provided By Symantec

  • White Papers // Nov 2007

    Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies

    Veritas NetBackup 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage...

    Provided By Symantec

  • Webcasts // May 2007

    VCS for VMware ESX: The Only Comprehensive HA/DR Solution for the VMware Environment

    Companies have achieved higher utilization and lower hardware costs through server virtualization and consolidation. However, placing multiple applications on one server increases the impact of a human, software, or machine error. Where hardware failure may have impacted a single application, with virtualization, many applications may be affected. To mitigate this...

    Provided By Symantec

  • White Papers // May 2007

    Symantec Enterprise Vault: File System Archiving

    For more than 25 years, organizations have been attracted to the idea of providing different storage layers according to the relevance of data, an approach referred to as Hierarchical Storage Management (HSM). Today, however, companies accumulate an enormous amount of information, presenting new challenges. In addition to simply storing the...

    Provided By Symantec

  • Webcasts // Nov 2010

    Webcast: Smart Route to Windows 7

    Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process. During this 30 minute...

    Provided By Symantec

  • White Papers // Dec 2009

    Selecting Your Hosted Security Provider: What Every IT Manager Needs to Know

    Overall hosted security services provide savings and improved protection on many fronts, and make good economic and technical sense for most businesses. At Symantec Hosted Services - MessageLabs, the hosted security solution is second to none when it comes to accuracy, support, technical depth and research, depth of threat analysis...

    Provided By Symantec

  • White Papers // Oct 2009

    Eradicate Spam and Gain 100% Assurance of Clean Mailboxes

    Many great inventions have been used for substantial benefits and equal amounts of harm. This trend certainly applies to the Internet. While the medium has given the world a wealth of information that is instantly accessible with the click of a mouse, it has also spawned a breeding ground for...

    Provided By Symantec

  • White Papers // Oct 2009

    eDiscovery Compliance and the New Requirements of IT: The IT Manager's Guide to 100% Compliance

    Through the implementation of a strategic eDiscovery compliance program, incorporating clearly written rules, formal employee education, and a proven-effective Hosted Service Archiving Solution, US and Canadian employers can quickly and cost-effectively preserve, protect, and produce legally compliant email and other Electronically Stored Information (ESI) when compelled to do so by...

    Provided By Symantec

  • White Papers // Nov 2009

    Social Networking: Safely Manage the Paradigm Shift and Leverage Its Full Potential

    The phenomenal growth and popularity of social media websites has created promising opportunities for businesses as well as dangerous new ways for cyber-criminals to create havoc on corporate networks. This white paper from Symantec Hosted Services, written especially for IT and Security Managers, illustrates the many ways in which social...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • Webcasts // Jun 2008

    Symantec Endpoint Protection 11.0 - Benefits of Upgrading

    This webcast will present the benefits of upgrading to Symantec Endpoint Protection 11.0. Symantec Endpoint Protection threat prevention technologies present users with the optimum balance between security needs, administrative overhead and system impact. The webcast will focus on the advantages of the Symantec Endpoint Protection 11.0 management architecture, the required...

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • Webcasts // May 2007

    VCS for VMware ESX: The Only Comprehensive HA/DR Solution for the VMware Environment

    Companies have achieved higher utilization and lower hardware costs through server virtualization and consolidation. However, placing multiple applications on one server increases the impact of a human, software, or machine error. Where hardware failure may have impacted a single application, with virtualization, many applications may be affected. To mitigate this...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Aug 2009

    Medicaid MITA: Innovative COTS Solutions for IT Risk Management

    This paper provides an overview of the MITA Technical Architecture and discusses key areas of potential contribution to implementation of this framework from one the world's leading IT security and infrastructures software solution providers, Symantec. The goal of this paper is to facilitate discussion and familiarization of the Symantec Commercial...

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security.

    As use of the Internet has become increasingly commonplace and crucial to a wide range of applications, criminals have found an ever-growing group of people they can target. Apart from hurting users, this activity is detrimental to the brand of the real site being spoofed. Without trust, no website or...

    Provided By Symantec

  • White Papers // Feb 2010

    Migrating HP Serviceguard to Veritas Cluster Server on Linux

    This paper, created with the assistance of HP, illustrates a process to migrate an HP Serviceguard for Linux (SGLX) cluster to Veritas Cluster Server (VCS). An introduction to the architecture of VCS is described including sections comparing SGLX and VCS which contrast cluster terminology and describe architecture differences. A step-by-step...

    Provided By Symantec

  • Case Studies // Sep 2014

    A Tale of Two Malware Attacks: One Blocked and One Brutal

    How bad can it get when malware protection fails? And what can you do about it? CBS Interactive and Symantec are proud to present "A tale of two malware attacks: one blocked and one brutal," a cautionary tale that explores what goes wrong when users in small and medium-sized business...

    Provided By Symantec

  • White Papers // Oct 2009

    The Bredolab Files

    Trojan.Bredolab is a downloader that acts as a carrier or installer for arbitrary threats. It may download a password stealer, bot, rootkit, backdoor, or a misleading application. Some of the well-known threats it has been observed downloading include Backdoor.Rustock, Trojan.Srizbi, Trojan.Fakeavalert, and W32.Waledac. Since Bredolab installs a random mixture of...

    Provided By Symantec

  • White Papers // Nov 2009

    Inside the Jaws of Trojan.Clampi

    While Trojan.Clampi's lineage can be traced back to 2005, only variants over the last year have evolved sufficiently enough to gain more notoriety. The main purpose of Clampi is to steal online banking credentials to conduct the unauthorized transfer of funds from hacked accounts to groups likely in Eastern Europe...

    Provided By Symantec

  • White Papers // Aug 2009

    W32.Waledac: Threat Analysis

    W32.Waledac is a worm that uses social engineering and certain client side vulnerabilities in order to propagate. The worm has functionality to download and execute binaries, act as a network proxy, send spam, mine infected computers for data, such as email addresses and passwords, and perform Denial of Service (DoS)...

    Provided By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Provided By Symantec

  • White Papers // Mar 2010

    Pay-Per-Install: The New Malware Distribution Network

    Malware authoring and distribution has become very profitable over the years. Earlier, malware was written mainly for fame and notoriety. However, it has now become a very profitable enterprise, backed by a strong business model. The process of propagating and distributing malware has been evolving constantly. A few years back,...

    Provided By Symantec

  • White Papers // Dec 2009

    A Museum of API Obfuscation on Win32

    Antivirus software vendors attempt to identify threats by unpacking suspicious samples and hence aim to produce as many unpackers as possible. When characteristic portions of a successfully unpacked sample are identified, the sample can be tagged and detection added. This procedure is commonly used for variants of well-known malware families...

    Provided By Symantec

  • White Papers // Nov 2009

    Zeus: King of Bots

    Zbot, also known as Zeus, is a malware package that is readily available for sale and also traded in underground forums. The package contains a builder that can generate a bot executable and Web server files (PHP, images, SQL templates) for use as the command and control server. While Zbot...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Provided By Symantec

  • White Papers // Sep 2011

    Internet security in the age of roaming users

    The whole concept of business - how it's done, when it's done, where it's done - is changing radically, and the legions of mobile workers are leading the change. While cloud computing benefits businesses by allowing employees to work remotely, this model also introduces a host of new security risks....

    Provided By Symantec

  • White Papers // Sep 2011

    Email, archiving and productivity

    Is your email system holding back your business? While email has become an indispensible technology, it presents a new set of issues for businesses, from storage demands to increased IT requests to searching difficulties. Companies looking to solve these problems are increasingly looking at hosted email archiving solutions, a centralised...

    Provided By Symantec

  • White Papers // Sep 2009

    Symantec NetBackup PureDisk: Optimizing Backups With Deduplication for Remote Offices, Data Center and Virtual Machines

    Modern endeavours find themselves faced with the issue of fast paced growing data. In fact, data growth has been predicted to be in the range of 50-60% per year. But data, instead of being confined to a single centre, is often spread across multiple data centres, remote offices and virtual...

    Provided By Symantec

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Provided By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Provided By Symantec