Symantec

Displaying 281-320 of 327 results

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jul 2009

    The Economics of Green IT: Start Saving Money

    CIOs pay millions of dollars a year to power and cool data centers. Many enterprises, some for the first time this year, have shifted the energy bill from facilities to IT, with the hope - and expectation - that IT can lower energy costs. In addition, many enterprises seek to...

    Provided By Symantec

  • Webcasts // Jul 2009

    Put Data Storage on a Diet With Symantec Deduplication

    If there's one absolute in business, it's that data will continue to grow. Organizations of all sizes around the world wrestle with an ever-growing array of information management headaches, storage concerns and recovery needs. And increasingly, organizations are turning to data deduplication to address these issues. But how one will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • White Papers // Jul 2009

    Stealthy Deployment and Execution of In-Guest Kernel Agents

    As more and more Virtual Machines (VM) are packed into a physical machine, refactoring common kernel components shared by virtual machines running on the same physical machine could significantly reduce the overall resource consumption. The refactored kernel component typically runs on a special VM called a virtual appliance. Because of...

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • White Papers // Jul 2009

    Containing an Outbreak: How to Clean Your Network After an Incident

    It's not the sort of statement want to hear in regards to network. Whether a network admin plans a containment strategy or an executive assessing the damage done, one knows that such situations cost time and money to resolve. Determining where to start can be equally as frustrating, especially when...

    Provided By Symantec

  • White Papers // Jul 2009

    Backup for VMware ESX Environments With Veritas NetBackup PureDisk From Symantec

    Traditional backup solutions are able to back up virtual guests on a VMware ESX host; however, the resource utilization on the host and the backup time required quickly become areas of concern. The NetBackup PureDisk client running in a virtual guest provides excellent deduplication at the source and can back...

    Provided By Symantec

  • White Papers // Jul 2009

    Powering Linux in the Data Center

    Many IT professionals are drawn by the economy that Linux brings to the data center but are concerned about the potential risks that arise from trusting their business to "Free" software. For mission-critical enterprise data center applications, the complete line of Symantec data management and protection offerings delivers UNIX-class performance,...

    Provided By Symantec

  • White Papers // Jun 2009

    Automatic Generation of String Signatures for Malware Detection

    Scanning les for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware...

    Provided By Symantec

  • Webcasts // Jun 2009

    Increase Server Availability by Automating Problem Resolution Using Altiris Server Management Suite From Symantec

    Increasing server availability and uptime is a chief concern for server administrators. However, proactively detecting issues that affect server availability is often an inconsistent and manual process. The attendee will learn how to regularly monitor the critical server processes using Altiris Server Management Suite's Monitor Solution to detect issues early...

    Provided By Symantec

  • Webcasts // Jun 2009

    Faster Recovery With Symantec: Comparative Testing of Data Protection Solutions

    The presenter of this webcast will provide an overview of the test processes, highlight key findings about current solutions in the marketplace, and relate why they are important to any business running Microsoft Exchange and/or VMware environments. The attendee will learn the challenges of protecting Exchange environments, alternatives to protecting...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • Webcasts // Jun 2009

    Symantec Workflow and Security Responses

    One of the employees looses a laptop or "Accidentally" copies critical data to a USB drive before they leave the building. Perhaps there is a virus outbreak and one needs to get the critical patch out to the endpoints. What is the process for responding to these security threats and...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Webcasts // Jun 2009

    Discover How Mid-Size Organizations Effectively Secure Their Environments With the New Symantec Protection Suite

    How completely is the environment protected from today's complex malware, data loss, and spam threats? The presenter of this webcast discusses challenges faced by mid-sized organizations and how Symantec's newest security suite, Symantec Protection Suite Enterprise Edition, can help one address those challenges. Symantec Protection Suite Enterprise Edition creates a...

    Provided By Symantec

  • Webcasts // Jun 2009

    How and Why You Need to Protect Your Small Business

    How completely is small business environment protected from today's complex malware, data loss and spam threats? How can one have confidence that the assets are continuously protected while focusing on running the business? Symantec Protection Suite Small Business Edition is an easy to use, "All-in-one" suite that protects critical business...

    Provided By Symantec

  • Webcasts // Jun 2009

    Backup Is for Recovery, Archiving Is for Discovery: Legal and IT Considerations of Each

    The presenters of this webcast discuss the changing role of backup technology in the enterprise. The presenters discuss four key elements of backup and archiving: Backup is for Recovery, Archiving is for Discovery, Accessible or Inaccessible, Backup and Archive Retention Policies and Archiving and Backup.

    Provided By Symantec

  • White Papers // Jun 2009

    Converged Threats on the Security Landscape

    The pervasive presence of malware on the Internet today creates more opportunities for mixing and matching dangerous content than has ever been possible. The essence of a converged threat is the combination of viruses, spyware, phishing, spam and other attempts at attack or exploitation of vulnerabilities that can disrupt networks...

    Provided By Symantec

  • Webcasts // May 2009

    Data Protection and Compliance: Improve Security, Manage Risk & Lower Costs

    Information has become the single most important asset to an organization's success, whether it's customer information, confidential corporate information, or financial information. Ensuring that information assets remain secure and readily available to remote employees, customers, and partners is critical to a high performance organization. The attendee will gain an understanding...

    Provided By Symantec

  • Case Studies // May 2009

    Leading Express Delivery Service Provider Automates System Administration With Symantec

    Every night, DHL processes more than 1,500 metric tons of freight at its hub in Leipzig. This volume demands a stable IT infrastructure that administrators can manage efficiently from a central location. The DHL Hub Leipzig GmbH does this with the help of a Symantec solution which is used to...

    Provided By Symantec

  • Webcasts // May 2009

    Competitive Analysis of Performance Impact of Endpoint Security Solutions for Small Businesses

    In small businesses with limited budgets for hardware upgrades, it is important that security software does not significantly impact computer performance. The presenter of this webcast gives the findings of a comprehensive performance comparison which includes 7 vendors, 44 test scenarios, and over 2000 individual test runs. The test concentrated...

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Server Management Suite 7.0

    With the launch of Altiris Server Management Suite 7.0, Symantec supplies the essentials for server management. The attendee will learn about the new and exciting features for servers from the new approach to server monitoring and enhanced proven technologies in server inventory to device discovery, server provisioning, and software and...

    Provided By Symantec

  • Webcasts // Mar 2009

    NEW Backup Exec Infrastructure Manager 12.5 - Managing Your Backup Exec Environment With Ease

    The presenter of this webcast gives a technical overview and demonstration of the NEW Backup Exec Infrastructure Manager 12.5, the latest addition to the Backup Exec family. Backup Exec Infrastructure Manager (powered by Altiris technology) delivers great benefits, simplifying the automation, deployment, and updating, upgrades, and licenses management of Backup...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • Webcasts // Feb 2009

    Top 7 Backup Mistakes to Avoid in Windows Environment

    There are several common backup/restore mistakes that could be costing the money and even putting the business data at risk. The attendee will learn how Backup Exec for Windows 12.5 and Backup Exec System Recovery 8.5 can help to avoid these common backup mistakes in Windows environments.

    Provided By Symantec

  • White Papers // Feb 2009

    Web Based Attacks

    Technology growth on the Web has changed the way businesses and consumers communicate and interact with each other. The Web has become a staple for information sharing and commercial transactions. At the same time it has also become complex, without boundaries and immediate in its nature. A single Web page...

    Provided By Symantec

  • Webcasts // Jan 2009

    Symantec Log Management Service: Capture Log Files, Respond to Threats and Address Growing Compliance Demands

    IT risk and compliance demands are heightening the need for a security approach that delivers comprehensive security monitoring and real-time incident alerting that expands support beyond networks to include critical servers, applications and end points, compliance reporting that eases administrative burdens and can accommodate custom reporting needs and flexible archive...

    Provided By Symantec

  • White Papers // Jan 2009

    Reinventing IT in Troubling Times

    Today, IT is on the cusp of innovation more so than any time in the last 10 years. These changes coincide with the advent of new period of economic instability that will require IT organizations to rely more on an integrated systems management framework. Symantec is committed to providing customers...

    Provided By Symantec

  • White Papers // Jan 2009

    Best Practice for NDMP Backup Veritas NetBackup

    Many customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their Network Attached Storage (NAS) servers. Most NAS vendors and data protection providers (such as Symantec) have multiple options for protecting the NAS environment. This paper will help to make sense...

    Provided By Symantec

  • White Papers // Jan 2009

    IT Budget Strategy in a Down Economy: Stop Buying Storage!

    The current recessionary economic cycle has introduced a great deal of uncertainty into the business climate. Organizations are reluctant to spend any more money than absolutely necessary, which has limited or delayed the acquisition of IT equipment that otherwise, might have been routine. Forecasts vary widely for the depth and...

    Provided By Symantec

  • Resource Center // Jan 2009

    Symantec Backup Exec Challenge

    Symantec invites you to take the Backup Exec? Challenge. Answer six questions to receive an analysis of how your current backup solution compares to Symantec Backup Exec 12.5 and Symantec Backup Exec System Recovery 8.5.

    Provided By Symantec

  • White Papers // Dec 2008

    NetBackup Architecture Overview

    The purpose of this paper is to provide an overview of the requirements for a basic NetBackup architecture to help customers understand which components are required in a data protection solution. Where possible, an example of a component will be noted; however, that component could be swapped for a similar...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security.

    As use of the Internet has become increasingly commonplace and crucial to a wide range of applications, criminals have found an ever-growing group of people they can target. Apart from hurting users, this activity is detrimental to the brand of the real site being spoofed. Without trust, no website or...

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Jun 2014

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Provided By Symantec

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Provided By Symantec

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Provided By Symantec

  • White Papers // Mar 2013

    How to provide secure single sign-on and identity based access control for cloud applications

    This Symantec paper describes how single sign-on (SSO) provides a convenient and simple user interface to all cloud services and Web applications used by an enterprise. It explains how a well architected SSO and access control solution allows IT to maintain oversight with policy-based controls that leverage an existing identity...

    Provided By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Provided By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Provided By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Provided By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Requirement for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Provided By Symantec

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Provided By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec