Symantec

Displaying 281-320 of 518 results

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jul 2009

    The Economics of Green IT: Start Saving Money

    CIOs pay millions of dollars a year to power and cool data centers. Many enterprises, some for the first time this year, have shifted the energy bill from facilities to IT, with the hope - and expectation - that IT can lower energy costs. In addition, many enterprises seek to...

    Provided By Symantec

  • Webcasts // Jul 2009

    Put Data Storage on a Diet With Symantec Deduplication

    If there's one absolute in business, it's that data will continue to grow. Organizations of all sizes around the world wrestle with an ever-growing array of information management headaches, storage concerns and recovery needs. And increasingly, organizations are turning to data deduplication to address these issues. But how one will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • White Papers // Jul 2009

    Stealthy Deployment and Execution of In-Guest Kernel Agents

    As more and more Virtual Machines (VM) are packed into a physical machine, refactoring common kernel components shared by virtual machines running on the same physical machine could significantly reduce the overall resource consumption. The refactored kernel component typically runs on a special VM called a virtual appliance. Because of...

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • White Papers // Jul 2009

    Containing an Outbreak: How to Clean Your Network After an Incident

    It's not the sort of statement want to hear in regards to network. Whether a network admin plans a containment strategy or an executive assessing the damage done, one knows that such situations cost time and money to resolve. Determining where to start can be equally as frustrating, especially when...

    Provided By Symantec

  • White Papers // Jul 2009

    Powering Linux in the Data Center

    Many IT professionals are drawn by the economy that Linux brings to the data center but are concerned about the potential risks that arise from trusting their business to "Free" software. For mission-critical enterprise data center applications, the complete line of Symantec data management and protection offerings delivers UNIX-class performance,...

    Provided By Symantec

  • White Papers // Jul 2009

    Backup for VMware ESX Environments With Veritas NetBackup PureDisk From Symantec

    Traditional backup solutions are able to back up virtual guests on a VMware ESX host; however, the resource utilization on the host and the backup time required quickly become areas of concern. The NetBackup PureDisk client running in a virtual guest provides excellent deduplication at the source and can back...

    Provided By Symantec

  • White Papers // Jun 2009

    Automatic Generation of String Signatures for Malware Detection

    Scanning les for signatures is a proven technology, but exponential growth in unique malware programs has caused an explosion in signature database sizes. One solution to this problem is to use string signatures, each of which is a contiguous byte sequence that potentially can match many variants of a malware...

    Provided By Symantec

  • Webcasts // Jun 2009

    Increase Server Availability by Automating Problem Resolution Using Altiris Server Management Suite From Symantec

    Increasing server availability and uptime is a chief concern for server administrators. However, proactively detecting issues that affect server availability is often an inconsistent and manual process. The attendee will learn how to regularly monitor the critical server processes using Altiris Server Management Suite's Monitor Solution to detect issues early...

    Provided By Symantec

  • Webcasts // Jun 2009

    Faster Recovery With Symantec: Comparative Testing of Data Protection Solutions

    The presenter of this webcast will provide an overview of the test processes, highlight key findings about current solutions in the marketplace, and relate why they are important to any business running Microsoft Exchange and/or VMware environments. The attendee will learn the challenges of protecting Exchange environments, alternatives to protecting...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • Webcasts // Jun 2009

    Symantec Workflow and Security Responses

    One of the employees looses a laptop or "Accidentally" copies critical data to a USB drive before they leave the building. Perhaps there is a virus outbreak and one needs to get the critical patch out to the endpoints. What is the process for responding to these security threats and...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Webcasts // Jun 2009

    Discover How Mid-Size Organizations Effectively Secure Their Environments With the New Symantec Protection Suite

    How completely is the environment protected from today's complex malware, data loss, and spam threats? The presenter of this webcast discusses challenges faced by mid-sized organizations and how Symantec's newest security suite, Symantec Protection Suite Enterprise Edition, can help one address those challenges. Symantec Protection Suite Enterprise Edition creates a...

    Provided By Symantec

  • Webcasts // Jun 2009

    How and Why You Need to Protect Your Small Business

    How completely is small business environment protected from today's complex malware, data loss and spam threats? How can one have confidence that the assets are continuously protected while focusing on running the business? Symantec Protection Suite Small Business Edition is an easy to use, "All-in-one" suite that protects critical business...

    Provided By Symantec

  • Webcasts // Jun 2009

    Backup Is for Recovery, Archiving Is for Discovery: Legal and IT Considerations of Each

    The presenters of this webcast discuss the changing role of backup technology in the enterprise. The presenters discuss four key elements of backup and archiving: Backup is for Recovery, Archiving is for Discovery, Accessible or Inaccessible, Backup and Archive Retention Policies and Archiving and Backup.

    Provided By Symantec

  • White Papers // Jun 2009

    Converged Threats on the Security Landscape

    The pervasive presence of malware on the Internet today creates more opportunities for mixing and matching dangerous content than has ever been possible. The essence of a converged threat is the combination of viruses, spyware, phishing, spam and other attempts at attack or exploitation of vulnerabilities that can disrupt networks...

    Provided By Symantec

  • Webcasts // May 2009

    Data Protection and Compliance: Improve Security, Manage Risk & Lower Costs

    Information has become the single most important asset to an organization's success, whether it's customer information, confidential corporate information, or financial information. Ensuring that information assets remain secure and readily available to remote employees, customers, and partners is critical to a high performance organization. The attendee will gain an understanding...

    Provided By Symantec

  • White Papers // May 2009

    Economic Stimulus Package and Health Care: Best Practices to Manage EHR and Minimize Security, Privacy and Compliance Risks

    MessageLabs Email Continuity Service helps organizations maximize email availability and guard against the disruption and data loss that can result from an email outage. Services include an on-demand Email Failover System that kicks in seamlessly when an outage occurs, allowing email users to continue sending and receiving messages through Outlook,...

    Provided By Symantec

  • Webcasts // May 2009

    Backup and Recover Your Microsoft Hyper-V Environment in Seconds

    Planning to implement Microsoft Hyper-V to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several infrastructure changes that must be addressed. One change must consider is how to implement a reliable backup and recovery solution to protect critical data...

    Provided By Symantec

  • Webcasts // May 2009

    Maximize Your Data Protection Infrastructure

    The attendee of this webcast will get a better understanding on how to maximize the NetBackup data protection infrastructure. Building a robust infrastructure begins with the right architecture and this webcast will provide guidance on this design process and the most important areas of consideration.

    Provided By Symantec

  • Case Studies // May 2009

    Leading Express Delivery Service Provider Automates System Administration With Symantec

    Every night, DHL processes more than 1,500 metric tons of freight at its hub in Leipzig. This volume demands a stable IT infrastructure that administrators can manage efficiently from a central location. The DHL Hub Leipzig GmbH does this with the help of a Symantec solution which is used to...

    Provided By Symantec

  • White Papers // May 2009

    Managed Outcome: A New Paradigm for IT Departments

    A real-world example of the benefits of the Managed Outcome model is offered by Forrester Research According to Forrester, "A successful transition to a Managed Outcome relationship typically yields an additional 20% to 30% savings improvement" beyond typical expectations from outsourcing technical staff. Forrester adds that other key benefits of...

    Provided By Symantec

  • Webcasts // May 2009

    Competitive Analysis of Performance Impact of Endpoint Security Solutions for Small Businesses

    In small businesses with limited budgets for hardware upgrades, it is important that security software does not significantly impact computer performance. The presenter of this webcast gives the findings of a comprehensive performance comparison which includes 7 vendors, 44 test scenarios, and over 2000 individual test runs. The test concentrated...

    Provided By Symantec

  • White Papers // May 2009

    Symantec: Malicious Code Activity Spiked in 2008

    As malicious code continues to grow at a record pace, attackers are shifting away from the mass distribution of a few threats to the micro-distribution of millions of distinct threats. Moreover, these cybercriminals are intent upon distributing threats that steal confidential information, particularly bank account credentials and credit card data.

    Provided By Symantec

  • Webcasts // May 2009

    What's New in Backup Reporter 6.6: Now With Archive Reporting and Even More Enhanced Backup Reporting

    Backup Reporter 6.6 new features and enhancements will be showcased. The premier new feature is that it is now capable of reporting on Symantec's industry leading archiving solution, Enterprise Vault. The same business-level trending and analysis can be applied to archive reporting as well as its already superb backup reporting....

    Provided By Symantec

  • Webcasts // May 2009

    From Endpoint to Gateway: Effectively Secure Your Environment With the New Symantec Protection Suite Enterprise Edition

    How compete is the environment protected from today's complex malware, data loss, and spam threats? In the event of user error, hardware failure, or malicious action can one rapidly recover desktops and laptops so the users can remain productive? The presenter of this webcast discuss Symantec's newest security suite, Symantec...

    Provided By Symantec

  • White Papers // May 2009

    Veritas Storage Foundation for Windows: Dynamic Multi-Pathing Competitive Comparisons

    Multi-pathing software provides the intelligence necessary to manage multiple I/O paths between a server and a storage subsystem. When configured for redundancy, a single path is dedicated to I/O transfer, while other paths are in standby mode. The software manages failover between the I/O paths, thus eliminating the potential for...

    Provided By Symantec

  • White Papers // May 2009

    Enterprise Vault 8.0: File System Archiving

    Enterprise Vault surpasses the scope, ability and performance of typical file management applications which merely move data based on broad policies from one storage device to another. As files are now routinely being requested for internal and external investigations, Enterprise Vault File System Archiving enables the organizations to meet their...

    Provided By Symantec

  • White Papers // May 2009

    VERITAS Storage Foundation Cluster File System 5.0 From Symantec: Using CFS for Oracle Fast Failover

    Symantec Cluster File System provides an efficient solution for fast failover of Oracle databases without incurring the cost and complexity of a Oracle RAC environment. It provides downtime SLAs within acceptable limits for most applications. The fundamental properties of CFS including access to shared file systems by applications running on...

    Provided By Symantec

  • White Papers // May 2009

    Essential Server Management for Mid-Sized Organizations: A Strategy for overcoming Challenges in Today's Complex and Costly IT Environments

    The task of server management is more costly and complex than ever. At the same time, there have never been greater expectations for IT departments to deliver business value to the organizations they serve. Altiris Server Management Suite from Symantec provides essential server management that enables IT administrators to focus...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation for Windows

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation HA for Windows From Symantec

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • White Papers // May 2009

    Top 10 Things Small Businesses Must Know About Protecting and Securing Their Business Data

    Small business owners and IT personnel agree that securing and backup up their data is critical - yet why are so many businesses falling short? Often, they need best practices to know where to begin. Donna Childs, author and small business consultant provides guidelines so small businesses can take the...

    Provided By Symantec

  • White Papers // May 2009

    The Endpoint Security Shootout: How the Biggest Vendors Measure Up

    Looking for an endpoint security solution for your business? To avoid making an investment you'll end up regretting, you need to make sure you do your research. In addition to strong security features, you also need to make sure that the security product's performance won't slow your business down. Get...

    Provided By Symantec

  • White Papers // Mar 2010

    Symantec Protection Suite Add-On for Hosted Email Security

    This paper studies malware and spam as the two most harmful threats to email and IT security. While malware and spam tend to cause tremendous harm to the health and viability of IT networks, it is email security that deserves tremendous attention. This paper looks at cyber criminal attacks that...

    Provided By Symantec

  • Webcasts // Jan 2010

    Preparing for E-Discovery With Strategic Information Management

    The information management strategy which is prepared with considerable care can have great effect on the organizations capability to handle its information, and at the same time retrieve it in the event of legal action. In the demanding, and growing requests for the e-discovery, all the teams which are Legal,...

    Provided By Symantec

  • Webcasts // Jan 2010

    Protect Your Email With Symantec Brightmail Gateway 9.0

    This webcast covers information regarding, how to protect your email with the help of the latest release Symantec Bright mail Gateway 9.0. Symantec Bright mail Gateway is one of the latest effective as well as accurate real time antispams and antivirus protection application which delivers both inbound as well as...

    Provided By Symantec

  • Webcasts // Jan 2010

    Meeting the Challenges of Today's Targeted Attacks

    This webcast in particular deals with it security, and offers the attendee the information on what targeted attacks are, how the Hydraq attack worked to steal information from the world's biggest companies, and how to develop a security strategy that can help stop targeted attacks. The webcast also deals with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec NetBackup's Unique Integration With VMware vSphere 4

    If someone is a person who is responsible or interested in the protection of the various virtual machines, then this is the right webcast for them, and for those who are really interested in the virtual machines, and virtual technologies. The webcast offers the ways to identify the major five...

    Provided By Symantec

  • White Papers // Dec 2009

    Symantec Brightmail Anti Phishing

    In today's information driven world, cyber criminals are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. One method that is frequently employed is phishing, which the criminally fraudulent process of attempting to acquire sensitive information such...

    Provided By Symantec

  • White Papers // Oct 2009

    Symantec Backup Exec System Recovery 2010: Protect Against Business Downtime and Disaster With Rapid, Reliable Backup and Recovery

    Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small businesses that helps minimize downtime and avoid disaster by easily recovering data files or complete systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. New functionality in Backup Exec...

    Provided By Symantec

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Virtualize With Confidence in Hyper-V Environments

    In this webcast, the presenter discusses advantages for Hyper-V environments gained from Live Storage Migration and Wide Area Disaster Recovery features in Veritas Storage Foundation and High Availability for Windows 6.0.

    Provided By Symantec

  • Webcasts // Jan 2012

    Improve Service Levels and Reduce Cost With Storage Foundation Manager

    In this webcast, the presenter discusses why Storage Foundation Manager is a must have for Data Center Environments running Storage Foundation and High Availability software to dramatically improve service levels while reducing cost.

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability for Linux

    In this webcast, the presenter explains about how standardization and a single, powerful set of tools that span operating systems and storage infrastructures can provide a foundation for standardized backup, disaster recovery and other data management and protection services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability Products on Solaris

    In this webcast, the presenter explains about using Veritas Storage Foundation and high availability products in a Solaris environment, including the importance of standardization, moving to clustered file systems, and workload performance.

    Provided By Symantec

  • Webcasts // Jan 2012

    High Availability With Veritas Cluster File System - Part 1

    In this webcast, the presenter explains what a clustered file system. The presenter also explains about the clustered file systems can be dramatically shorten application of failover and improve availability.

    Provided By Symantec

  • White Papers // Nov 2010

    Best Practices for Implementing a Security Process

    There is no doubt that the threat facing organizations today is enormous. At the same time, many organizations believe that improving security technology is the answer to solving the complex security challenges of today. Security technology has evolved from static firewalls and anti-virus products to full suites of tools that...

    Provided By Symantec

  • White Papers // Nov 2010

    Securing Your Mobile Workforce

    This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec. It also provides advice, best practices, and insight on how to create security and management policies for a distributed workforce.

    Provided By Symantec

  • White Papers // Nov 2010

    Managing Your Wireless Workforce

    Explosive growth in the mobile workforce has led to increasing attention paid to the security of mobile data and devices. Mobile data security is most effective when implemented in a series of layers: installing smart firewalls, deploying anti-virus software, and using encrypted connections. True mobile security doesn't stop at devices...

    Provided By Symantec

  • White Papers // Nov 2010

    Break From The Routine

    With one IT department in five spending more than half its time and resources on routine updates, maintenance and administration of existing systems, it is not surprising that top business objectives such as business process improvements, reducing enterprise costs, increasing the use of information/analytics, improving workforce effectiveness and attracting new...

    Provided By Symantec

  • White Papers // Nov 2010

    Mobility, Employees, Policies

    According to a 2009 survey by New York-based research firm Access Markets International (AMI) Partners, small and mid-sized businesses (SMBs) are becoming increasingly mobile organizations. This paper will discuss the growing concerns these organizations face with an increasingly distributed and mobile workforce, their specific information security needs and initial protective...

    Provided By Symantec

  • White Papers // Nov 2010

    Legal Risks of uncontrolled email and web

    Access to email and the Internet is a business critical application for most organizations, but the attributes that make such resources so essential inevitably generate significant risks for employers. Incidents of email and Internet misuse continue unabated. This paper considers some of the main risks that arise from employee use...

    Provided By Symantec

  • White Papers // Nov 2010

    Best Practices for Managing Financial Services Compliance

    Financial service organizations are constantly grappling with ever-changing, ever-mounting regulatory obligations to supervise and archive all discoverable content. This white paper discusses the fundamentals of financial services compliance. It then puts forth a case for considering archiving and security as a unified decision, and proposes an archiving solution based on...

    Provided By Symantec

  • White Papers // Jan 2010

    8 Key Requirements of an IT Governance, Risk and Compliance Solution

    Today IT security teams must contend with a dizzying array of challenges, from cyber-crime and government regulation to the ever increasing complexity of the IT environment itself. For organizations that handle large volumes of customer and employee information, the risk of a data breach is now higher than ever before....

    Provided By Symantec

  • White Papers // Nov 2009

    Confidence in the Cloud: Five Ways to Capitalize With Symantec

    Cloud computing is gaining significant traction as a new IT delivery model with potential business and financial benefits. Because cloud computing is still relatively new, organizations are grappling with what this emerging delivery model is, what some of the potential barriers are, and how best to take advantage of it....

    Provided By Symantec

  • White Papers // Dec 2009

    Anatomy of a Data Breach: Why Breaches Happen and What to Do About It

    For organizations that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. In fact, more electronic records were breached in 2008 than in the previous four years combined.1 this growth in...

    Provided By Symantec

  • White Papers // Jan 2010

    Microsoft Office 2000 and Security Against Macro Viruses

    This white paper discusses the new macro security features in Microsoft Office 2000. The first half of the paper provides information about the new features. The second half answers questions about the issues that people are likely to have about what all this means in the context of macro viruses....

    Provided By Symantec

  • White Papers // Apr 2009

    Premium Support Services Deliver: The Return on Investment for Symantec Business Critical Services

    Given today's challenging economic climate, companies across a wide range of industries are focusing on staying financially sound, serving markets and customers, and doing more with less. Reducing and controlling costs is a particularly strong area of emphasis across all functional areas, especially IT operations. This white paper is intended...

    Provided By Symantec

  • White Papers // Jan 2010

    Securing Your Company's Confidential Data

    Data volume is on the rise. Companies are collecting and storing more information than ever - about employees, customers, transactions, partners and assets. And this data is being accessed and shared in new ways such as through mobile devices and collaboration technologies. It's becoming increasingly important for companies to protect...

    Provided By Symantec

  • White Papers // Nov 2008

    Why Premium Support Is More Effective Than Standard Support in the Financial Services Industry

    Financial services industry customers are challenged as never before to respond quickly - armed as they are with limited budgets - to accommodate rapid changes in technology and customer demand. To be a winner in this field, companies must be able to guarantee a level of service quality and continuity...

    Provided By Symantec

  • White Papers // Apr 2010

    Symantec Internet Security Threat Report: Trends for 2009

    This summary will discuss current trends, impending threats, and the continuing evolution of the Internet threat landscape in 2009 based on data discussed within the Symantec Global Internet Security Threat Report. There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec...

    Provided By Symantec

  • Case Studies // Jan 2010

    Mitigating Against Security Risks and Ensuring IT Compliance - All at Reduced Cost

    It doesn't matter how fast a financial services organization is growing, how many new services are being introduced, or how quickly new customers are coming on board. One theme remains of paramount importance: reducing IT risk and achieving compliance objectives. For Abu Dhabi Commercial Bank (ADCB) these same principles apply,...

    Provided By Symantec

  • Case Studies // May 2009

    Leading Express Delivery Service Provider Automates System Administration With Symantec

    Every night, DHL processes more than 1,500 metric tons of freight at its hub in Leipzig. This volume demands a stable IT infrastructure that administrators can manage efficiently from a central location. The DHL Hub Leipzig GmbH does this with the help of a Symantec solution which is used to...

    Provided By Symantec

  • Case Studies // Apr 2010

    Symantec Case Study: Noel Leeming Group Limited

    With over 90 retail stores across New Zealand, Noel Leeming Group's success is built on its technology expertise and superior customer service. They wanted centralized IT team servicing decentralized users also In-house software incorrectly delaying genuine business emails. To master these challenges they turned MessageLab. MessageLabs Hosted Email AntiSpam, AntiVirus...

    Provided By Symantec

  • Case Studies // Mar 2010

    Cholet Town Hall Gains a Secure Information System With Symantec

    With an information system linking 40 sites across the region, a broad diversity of access points, and nearly 100 third-party applications, Cholet Town Hall was faced with a complex problem when it came to endpoint security. The French local authority therefore implemented a global solution combining Symantec Endpoint Protection, Symantec...

    Provided By Symantec

  • Case Studies // Aug 2010

    Legal Aid Center of Southern Nevada: Restoring Justice and Data Faster With Symantec and Kortek Solutions

    With 18,000 clients in the past year and demand growing, Legal Aid Center of Southern Nevada provides free legal advice and representation to low-income residents who can't afford an attorney. With a spike in the state's population growth and 11.2 percent of Southern Nevadans below the poverty line, these services...

    Provided By Symantec

  • Webcasts // Jan 2010

    Backing Up VMware: Benchmarks and Best Practices With NetBackup and Cisco

    VMware's new vStorage API for Data Protection has revolutionized virtual machine protection, however, to fully realize these capabilities one needs the proper tools. Symantec and Cisco have teamed up to show how using Symantec NetBackup 7's native integration with the vStorage API and Cisco's Unified Computing System (UCS) architecture can...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec Endpoint Protection

    In this webcast, the presenter will discuss the latest release of Symantec Endpoint Protection (SEP). This release includes new features in such areas as central management, virtualization support, new OS, and new recovery options. If one is responsible for managing or supporting SEP or want to stay on top of...

    Provided By Symantec

  • Webcasts // Jan 2010

    Overview on the Latest Deduplication Solution by Symantec, NetBackup 5000

    Symantec understands the shifting needs of the data center and has now launched a new deduplication appliance, NetBackup 5000, as an additional option for customers to leverage with their backup strategy and to help maintain information growth within their environment. NetBackup 5000 simplifies the deployment of deduplication to existing NetBackup...

    Provided By Symantec

  • White Papers // Oct 2010

    W32.Stuxnet Dossier

    W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats the author have analyzed. In this paper the author take a detailed look at Stuxnet and its various components and particularly focus on the...

    Provided By Symantec