Symantec

Displaying 281-320 of 367 results

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • Webcasts // Jan 2010

    Driving Cost Out of the Data Center With Veritas Cluster File System and Veritas Cluster Server

    Looking for real life examples on how other customers are driving cost out of their datacenter? Learn how Cluster File System High Availability is being used to reduce or even eliminate downtime costs through its fast failover capabilities. In addition, find out how other customers now finding additional new and...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce Your Storage Footprint and Improve File Server Performance With Archiving

    Reduce the storage footprint and reclaim space on the file servers that is unnecessarily housing large, old and duplicate data. Has a person ever run an analysis to see how old the information is that one is constantly backing up and having to manage? Is one struggling with performance and...

    Provided By Symantec

  • Downloads // Jun 2008

    Symantec Backup Exec System Recovery Server Edition

    Symantec Backup Exec System Recovery 8 restores systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. Backup Exec System Recovery 8 now includes: flexible offsite protection to an FTP location or secondary disk; granular recovery of Microsoft Exchange and SharePoint documents or files and...

    Provided By Symantec

  • White Papers // May 2009

    Symantec: Malicious Code Activity Spiked in 2008

    As malicious code continues to grow at a record pace, attackers are shifting away from the mass distribution of a few threats to the micro-distribution of millions of distinct threats. Moreover, these cybercriminals are intent upon distributing threats that steal confidential information, particularly bank account credentials and credit card data.

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • Webcasts // Jan 2010

    Whose Data Is It Anyway?

    How does one manage unstructured confidential data and prevent a breach? Unstructured data continues to grow at over 60% per year. Data security teams may have little or no visibility into where confidential data is stored, who is responsible for the data or who has access to that data. In...

    Provided By Symantec

  • Webcasts // Jan 2010

    How to Get Your SharePoint Growth Under Control and Prepare for SharePoint 2010

    If the person is looking into or already have SharePoint sites within the organization, optimizing storage resources should be top of mind. The attendee is likely enabling document versioning to enable better collaboration - but does he realize every new document version creates a whole new file in the SQL...

    Provided By Symantec

  • White Papers // Feb 2009

    Web Based Attacks

    Technology growth on the Web has changed the way businesses and consumers communicate and interact with each other. The Web has become a staple for information sharing and commercial transactions. At the same time it has also become complex, without boundaries and immediate in its nature. A single Web page...

    Provided By Symantec

  • White Papers // Apr 2013

    Good for security, good for business

    Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This Symantec white paper addresses the two biggest hurdles that small...

    Provided By Symantec

  • White Papers // Apr 2010

    Symantec Internet Security Threat Report: Trends for 2009

    This summary will discuss current trends, impending threats, and the continuing evolution of the Internet threat landscape in 2009 based on data discussed within the Symantec Global Internet Security Threat Report. There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • Downloads // May 2009

    Podcast: 10 Things Small Businesses Must do to Protect & Secure Data

    Small business owners and IT personnel agree that securing and backup up their data is critical - yet why are so many businesses falling short? Often, they need best practices to know where to begin. Donna Childs, author and small business consultant provides guidelines so small businesses can take the...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 3 - Planning, Tech Tips & Best Practice

    This whitepaper looks at some important aspects of a PST migration project; namely, planning and best practice usage of the tools in different migration scenarios. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. One of the key decisions when planning PST migration is choosing the...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec

  • Webcasts // May 2009

    Maximize Your Data Protection Infrastructure

    The attendee of this webcast will get a better understanding on how to maximize the NetBackup data protection infrastructure. Building a robust infrastructure begins with the right architecture and this webcast will provide guidance on this design process and the most important areas of consideration.

    Provided By Symantec

  • White Papers // Jan 2010

    Securing Your Company's Confidential Data

    Data volume is on the rise. Companies are collecting and storing more information than ever - about employees, customers, transactions, partners and assets. And this data is being accessed and shared in new ways such as through mobile devices and collaboration technologies. It's becoming increasingly important for companies to protect...

    Provided By Symantec

  • White Papers // Jan 2009

    Best Practice for NDMP Backup Veritas NetBackup

    Many customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their Network Attached Storage (NAS) servers. Most NAS vendors and data protection providers (such as Symantec) have multiple options for protecting the NAS environment. This paper will help to make sense...

    Provided By Symantec

  • White Papers // Dec 2008

    NetBackup Architecture Overview

    The purpose of this paper is to provide an overview of the requirements for a basic NetBackup architecture to help customers understand which components are required in a data protection solution. Where possible, an example of a component will be noted; however, that component could be swapped for a similar...

    Provided By Symantec

  • White Papers // May 2009

    VERITAS Storage Foundation Cluster File System 5.0 From Symantec: Using CFS for Oracle Fast Failover

    Symantec Cluster File System provides an efficient solution for fast failover of Oracle databases without incurring the cost and complexity of a Oracle RAC environment. It provides downtime SLAs within acceptable limits for most applications. The fundamental properties of CFS including access to shared file systems by applications running on...

    Provided By Symantec

  • Webcasts // May 2009

    From Endpoint to Gateway: Effectively Secure Your Environment With the New Symantec Protection Suite Enterprise Edition

    How compete is the environment protected from today's complex malware, data loss, and spam threats? In the event of user error, hardware failure, or malicious action can one rapidly recover desktops and laptops so the users can remain productive? The presenter of this webcast discuss Symantec's newest security suite, Symantec...

    Provided By Symantec

  • White Papers // May 2009

    Veritas Storage Foundation for Windows: Dynamic Multi-Pathing Competitive Comparisons

    Multi-pathing software provides the intelligence necessary to manage multiple I/O paths between a server and a storage subsystem. When configured for redundancy, a single path is dedicated to I/O transfer, while other paths are in standby mode. The software manages failover between the I/O paths, thus eliminating the potential for...

    Provided By Symantec

  • White Papers // May 2009

    Enterprise Vault 8.0: File System Archiving

    Enterprise Vault surpasses the scope, ability and performance of typical file management applications which merely move data based on broad policies from one storage device to another. As files are now routinely being requested for internal and external investigations, Enterprise Vault File System Archiving enables the organizations to meet their...

    Provided By Symantec

  • Webcasts // Jan 2010

    Redefining Endpoint Management With Symantec IT Management Suite 7.0

    Symantec IT Management Suite 7.0 reduces the cost and complexity of owning and managing corporate IT assets including desktops, laptops, and servers. View this webcast and discover what's new in Symantec IT Management Suite (formerly Altiris Total Management Suite), how ITMS automates common IT processes and increases service levels.

    Provided By Symantec

  • White Papers // May 2009

    Managed Outcome: A New Paradigm for IT Departments

    A real-world example of the benefits of the Managed Outcome model is offered by Forrester Research According to Forrester, "A successful transition to a Managed Outcome relationship typically yields an additional 20% to 30% savings improvement" beyond typical expectations from outsourcing technical staff. Forrester adds that other key benefits of...

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • White Papers // Apr 2009

    Are You Getting the Best Security for Your Money?

    Managing and protecting every device in an enterprise isn't easy. But an enterprise puts itself at risk if its IT organization lacks the visibility to protect the business' sensitive information, wherever it may be. Such visibility is not possible with a patchwork of security point products .To ensure that their...

    Provided By Symantec

  • White Papers // Apr 2009

    Enterprise Vault 8.0: Technical Overview

    Unstructured content like email and files are a huge management problem for companies of all sizes. The growth of this information in the form of email and files on storage devices and frontline servers are causing headaches as companies attempt to manage IT risk but maximize performance. This whitepaper has...

    Provided By Symantec

  • White Papers // Mar 2009

    Future-Proof Your IT Infrastructure

    Today's tough economic climate is challenging companies to reduce costs while continuing to focus on improving efficiencies. For IT departments everywhere, it's truly a "do more with less" dilemma. Client and server management suites from Symantec allow organizations to significantly reduce the hidden costs of managing endpoint systems throughout the...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • White Papers // Nov 2007

    Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies

    Veritas NetBackup 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage...

    Provided By Symantec

  • eBooks // Feb 2013

    Optimise your online business - A best practice guide

    This Symantec WSS e-book explores the global threat landscape, from attack toolkits to phishing, including what technologies can be compromised and how threats can affect business agility or breach data security systems. It will explain how website security solutions - such as extended validations SSL, along with regular malware scans...

    Provided By Symantec

  • White Papers // Nov 2009

    7 Steps to Windows 7: Migrating With Altiris Deployment Solution 6.9 SP3 From Symantec

    Migrating to Microsoft Windows 7 can be an intimidating task. One want to take advantage of how Windows 7 will help make users productive anywhere with enhanced security and control, but how does one implement an efficient, cost-effective migration that doesn't disrupt end-user productivity? While challenging, migration also presents an...

    Provided By Symantec

  • Case Studies // Mar 2010

    Cholet Town Hall Gains a Secure Information System With Symantec

    With an information system linking 40 sites across the region, a broad diversity of access points, and nearly 100 third-party applications, Cholet Town Hall was faced with a complex problem when it came to endpoint security. The French local authority therefore implemented a global solution combining Symantec Endpoint Protection, Symantec...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec