Symantec

Displaying 321-360 of 416 results

  • White Papers // Apr 2009

    Premium Support Services Deliver: The Return on Investment for Symantec Business Critical Services

    Given today's challenging economic climate, companies across a wide range of industries are focusing on staying financially sound, serving markets and customers, and doing more with less. Reducing and controlling costs is a particularly strong area of emphasis across all functional areas, especially IT operations. This white paper is intended...

    Provided By Symantec

  • White Papers // Apr 2009

    Veritas CommandCentral - Supporting the Virtual Enterprise

    Veritas CommandCentral is an enterprise storage management solution that provides the ability to manage storage effectively not only in the physical environment, but in the virtual environment as well. As organizations evaluate different physical and virtual solutions, it is imperative to consider the management implications of server and storage virtualization....

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec Brightmail Gateway v8.0

    The ongoing issue facing messaging administrators is how to preserve the value of messaging in light of escalating security threats and compliance requirements. Organizations are seeing an increased need for integrated secure content and threat management solutions that address multiple threats in a single solution. The Symantec Brightmail Gateway (Brightmail...

    Provided By Symantec

  • Webcasts // Mar 2009

    Case Study: Best Practices in Endpoint Security: How a Leading Company Secured Their Endpoints and Infrastructure Using Symantec Services

    The attendee will learn the best practices and deployment strategy for a Symantec Network Access Control (SNAC)-based solution for a State agency. The agency had to provide non-employees network access to the internet and public records databases, while at the same time providing network access (to highly confidential data) to...

    Provided By Symantec

  • White Papers // Mar 2009

    Risk, Readiness and Redundancy: PCI Compliance Automation With Symantec Control Compliance Suite

    For most of this decade, the major credit card companies have been aggressively developing standards to establish a common approach to protect the privacy and security of sensitive credit card data. In June 2001, Visa mandated the Cardholder Information Security Program (CISP) for merchants and financial institutions handling its card...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right: Cost, Risk and Readiness

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • White Papers // Mar 2009

    Future-Proof Your IT Infrastructure

    Today's tough economic climate is challenging companies to reduce costs while continuing to focus on improving efficiencies. For IT departments everywhere, it's truly a "do more with less" dilemma. Client and server management suites from Symantec allow organizations to significantly reduce the hidden costs of managing endpoint systems throughout the...

    Provided By Symantec

  • Webcasts // Mar 2009

    Data Loss During Downsizing: When Employees Exit, so Does Data

    The presenter of this webcast addresses "Data Loss During Downsizing," the results of a survey conducted by the Ponemon Institute. In these tough economic times, many companies are going through layoffs or downsizing. According to the results, more than half of ex-employees admit to stealing company data. The attendee will...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Server Management Suite 7.0

    With the launch of Altiris Server Management Suite 7.0, Symantec supplies the essentials for server management. The attendee will learn about the new and exciting features for servers from the new approach to server monitoring and enhanced proven technologies in server inventory to device discovery, server provisioning, and software and...

    Provided By Symantec

  • Webcasts // Mar 2009

    NEW Backup Exec Infrastructure Manager 12.5 - Managing Your Backup Exec Environment With Ease

    The presenter of this webcast gives a technical overview and demonstration of the NEW Backup Exec Infrastructure Manager 12.5, the latest addition to the Backup Exec family. Backup Exec Infrastructure Manager (powered by Altiris technology) delivers great benefits, simplifying the automation, deployment, and updating, upgrades, and licenses management of Backup...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Client Management Suite 7.0

    With the release of Altiris Client Management Suite 7.0, Symantec ushers in a new generation of client systems management. The presenter of this webcast shows some of the new and exciting features such as intelligent software management, integrated Cast of All Star technologies, power management, Windows, Mac and Linux support,...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • Webcasts // Mar 2009

    Storage Strategy for a Down Economy: Stop Buying Storage!

    Unlocking the "Hidden" storage capacity in most data centers may allow data center managers to avoid capacity upgrades for a year or more. The presenter of this webcast will provide a four-step prescription for identifying available capacity and utilizing it effectively. Moreover, this is not a stop-gap program but rather...

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Disaster Preparedness for Small Businesses: IT Strategies

    Small business requirements for IT solutions differ substantially from those of large businesses. A good IT solution provides contingent capacity, is simple and easy to operate. The presenter of this webcast discusses the vulnerabilities and threats that most directly affect the business. The presenter will share her recommendations for an...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • White Papers // Mar 2009

    Creating a Sustainable Infrastructure

    Compliance projects can bury organization in process and paperwork. Creating a sustainable compliance operation starts with using risk management to prioritize and continues with understanding how to leverage new technology in security, storage and networking infrastructure to create a true compliance infrastructure. The tools needed to become compliant are a...

    Provided By Symantec

  • Webcasts // Mar 2009

    Windows Disaster Recovery That's Affordable and Simple

    Disaster Recovery is often thought of as a complicated, time consuming and very costly process. As a result it's an IT project that often gets delayed in many organizations. But with Symantec Backup Exec System Recovery, one can implement a disaster recovery solution for the Windows environment that's cost effective,...

    Provided By Symantec

  • Webcasts // Mar 2009

    Do More With Less: A Healthcare Approach to Compliance Automation

    How to continue to protect sensitive information, spend less time and money on regulatory audit, and maintain operational excellence while dealing with flat or even declining IT budgets? The attendee will learn key strategies to mitigate risk, cut audit costs, and improve compliance efficiency as organizations head into 2009. The...

    Provided By Symantec

  • White Papers // Mar 2009

    Veritas Storage Foundation in a VMware ESX Environment: Linux and Solaris x64 Platforms

    This paper describes how to configure and use Veritas Storage Foundation in a VMware ESX environment. Because most features in Storage Foundation are supported in a VMware environment, this paper focuses on the features that work differently in a VMware environment and why certain features are not supported. The operating...

    Provided By Symantec

  • White Papers // Mar 2009

    How Enterprise Vault Supports Exchange 2007 High Availability Options

    This paper outlines the high availability options introduced in Exchange 2007, namely LCR, CCR and SCR, and discusses how Enterprise Vault supports them. This paper is intended only to position these technologies with respect to Enterprise Vault and is not intended to be a deep level technical discussion or a...

    Provided By Symantec

  • Presentations // Mar 2009

    Learn How to Control Endpoints in this 3 minute video

    Security has evolved. It's no longer just about having anti-virus software and a firewall. Discover what critical steps and components you may be missing and how Symantec's Altiris endpoint management solutions can provide complete endpoint control and accelerate IT productivity and efficiency. View this product tour and register to download...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for File System Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory, NetApp Filers, and EMC Celerras. It also provides insight as to how to change some of the settings to be configured in line with organizational preferences....

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • White Papers // Mar 2009

    Security Model for Compliance Accelerator 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and Internet Explorer. It will also provide insight as to how to configure Compliance department roles to be configured in line with organizational preferences. This whitepaper...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

    This whitepaper discusses the security aspects of archiving from Sharepoint with Enterprise Vault 8.0. It has discussed permissions required on SharePoint servers as well as their requirements in IIS. It also discusses the client access methods such as links and Web-parts. This whitepaper assumes the reader has already read the...

    Provided By Symantec

  • White Papers // Mar 2009

    How Veritas Storage Foundation Complements Microsoft Windows Server: Enhancing the Data Center

    Microsoft introduced several new storage management features in Windows Server 2003. In Windows Server 2008, they extend functionality to include the ability to shrink partitions and volumes online and DSMs to configure multi-pathing in iSCSI and FC environments. This paper will outline how Veritas Storage Foundation for Windows integrates and...

    Provided By Symantec

  • White Papers // Mar 2009

    Symantec Online Backup: Technical Brief

    Symantec Online Backup provides businesses with secure, affordable backup and recovery for PCs and servers over the Internet. Unlike on-premise backup solutions, Symantec Online Backup is an on-demand service that requires only a small agent on local computers. It automatically stores customer backup data in secure, off-site data centers managed...

    Provided By Symantec

  • Webcasts // Feb 2009

    Solving Your Top 5 Microsoft Hyper-V Backup and Recovery Challenges

    Is the business planning to implement Microsoft Hyper-V in order to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several challenges. One of the biggest challenges is implementing a reliable backup and recovery solution to protect critical data distributed...

    Provided By Symantec

  • White Papers // Feb 2009

    Strategies to Increase Application Availability

    High-availability solutions are essential to maintain business continuity in today's 24x7 environment. But these solutions must be evaluated for their ability to address the business and technical needs of the organization in which they will be deployed. Through central management tools, automated failover, features to test disaster recovery plans without...

    Provided By Symantec

  • Webcasts // Feb 2009

    Creating a Protected Endpoint and Messaging Environment with Symantec Multi-tier Protection

    Over 12,000 new malicious code threads are detected every day and 80% of all email identified as spam, the need to ensure complete protection is more important than ever before. The presenter of this webcast will discuss how Symantec Multi-tier Protection creates a protected endpoint and messaging environment while controlling...

    Provided By Symantec

  • Webcasts // Feb 2009

    In These Economic Times, How Can Endpoint Data Loss Prevention Help You Protect Confidential Information?

    When the economy creates a challenge for companies, they might look to reduce costs or evaluate hiring strategies. If a company is looking to reduce its workforce, how has it prepared to protect its intellectual property, customer and employee data? Recent research has shown that employees who fear losing their...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Microsoft Exchange Archiving and Retention Policy Development Featuring Old Dominion University

    The presenter will detail Old Dominion University's Notes to Exchange Migration which featured a Deployment of Microsoft Exchange 2007 and Symantec Enterprise Vault. The presenters will discuss few points such as deletion vs. Retention, exchange retention folders and archiving, records vs. non records and gives tips for simplifying the retention...

    Provided By Symantec

  • White Papers // Feb 2009

    Compliance Rules: Rules and Tools, Policies and Best Practices for Cost-Effective, Comprehensive Compliance in the United States

    Organizations of all types and sizes, industries and professions have long been mindful of the need for legal and regulatory compliance. In the current economic environment, however, forward-thinking organizations now are shifting their focus somewhat. Mere adherence to laws and regulations is no longer enough. Thanks to tight economic conditions...

    Provided By Symantec

  • Webcasts // Feb 2009

    How to Do More With Less When Protecting Microsoft Exchange With Veritas NetBackup

    With everyone being asked to do more with less why shouldn't the backup application be asked the same? Symantec's Granular Recovery Technology eliminates MAPI backups and allows for the quick recovery of individual email messages and the entire application. The attendee will learn how to shorten the recovery time, backup...

    Provided By Symantec

  • Webcasts // Feb 2009

    Running Backups on a Budget - Protecting Your Data and the Bottom Line!

    Data volumes increase while IT budgets decrease. Efficiently leverage the Backup Exec Family to keep critical data protected and easily meets recovery point objectives without breaking the budget. The attendee will learn how to reduce storage utilization by more than 50% with patent pending granular recovery technology.

    Provided By Symantec

  • White Papers // Feb 2009

    Protection You Can Count On

    For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company's bottom line if that data isn't protected. SMBs should...

    Provided By Symantec

  • White Papers // Nov 2009

    Singapore: A Prime Target for Cyber-Crime

    Singapore's status as a leading financial and commercial hub has made it a prime target for Internet-borne threats that are endangering businesses worldwide. 2009 has seen an unwelcome surge in spam, viruses and targeted trojans heading for corporate gateways across Singapore. The danger they pose for Singapore now significantly exceeds...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • Webcasts // Sep 2009

    Reduce Costs With Good Systems Management Practices in Hard Economic Times

    As budgets are being slashed, IT is still expected to do more with less to support the business. With good systems management practices in place using products from Symantec such as Altiris Client Management Suite, IT professionals can reduce overall costs of owning PCs throughout their organization. This webcast will...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • Webcasts // Sep 2009

    Manage and Secure Your Mobile Devices Efficiently

    The attendee of this webcast will learn how Symantec makes it easy to manage and secure mobile devices efficiently. A priority for IT organizations is to efficiently secure all their endpoints and gain confidence that corporate assets and business operations are protected and updated - all while controlling costs. After...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • Webcasts // Jun 2009

    Faster Recovery With Symantec: Comparative Testing of Data Protection Solutions

    The presenter of this webcast will provide an overview of the test processes, highlight key findings about current solutions in the marketplace, and relate why they are important to any business running Microsoft Exchange and/or VMware environments. The attendee will learn the challenges of protecting Exchange environments, alternatives to protecting...

    Provided By Symantec

  • Webcasts // Sep 2009

    Prevent Security Breaches by Protecting Information Proactively

    Which organizations want to be in the news because of a security breach? Threats to corporate information continue to increase and IT organizations now have to worry about internal and external attack vectors - including employees who may either intentionally or accidentally risk critical information. Loss of this critical information...

    Provided By Symantec

  • Webcasts // Jun 2009

    Increase Server Availability by Automating Problem Resolution Using Altiris Server Management Suite From Symantec

    Increasing server availability and uptime is a chief concern for server administrators. However, proactively detecting issues that affect server availability is often an inconsistent and manual process. The attendee will learn how to regularly monitor the critical server processes using Altiris Server Management Suite's Monitor Solution to detect issues early...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec APJ Internet Security Threat Report Trends for 2008

    The Symantec APJ Internet Security Threat Report provides an annual overview and analysis of Internet threat activity, a review of known vulnerabilities, and highlights of malicious code in the Asia-Pacific/Japan (APJ) region. Trends in phishing and spam are also assessed. Previously, Symantec presented data on a six-month basis. This volume...

    Provided By Symantec

  • White Papers // Oct 2012

    Bolster mobile app security with code signing

    Innovative new mobile devices and easy-to-use storefronts have made the demand higher than ever before for mobile apps. Developers, network and platform providers and device manufacturers have created a thriving and highly profitable market for mobile apps, but cybercriminals are also capitalising with malicious software, designed to steal user information...

    Provided By Symantec

  • Webcasts // Aug 2009

    Automating Server Management Processes With Workflow

    This webcast will discuss the benefits of automation, or workflow, within an IT department to help reduce the time that administrators spend on mundane, repetitive and manual tasks. The webcast will highlight the Altiris Workflow Solution and give several real-world examples of how server focused IT processes can be automated...

    Provided By Symantec

  • White Papers // Oct 2012

    Adding up the cost of self-signed SSL certificates

    Although many IT professionals believe that using self-signed SSL certificates can help their organisations lower security costs, the real numbers tell a different story. From datacentre infrastructure and physical security, to the hardware and software required for the PKI SSL system, to the personnel needed to manage the certificate lifecycle,...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Oct 2012

    Best practice: Thwarting website security threats

    How can businesses build trust and secure weak links to protect data and employees against dangerous website malware, email-borne infections, rootkits, toolkits and social-network threats? This Symantec white paper, based on the Internet Security Threat Report, looks at best practices for both businesses and consumers.

    Provided By Symantec

  • White Papers // Oct 2012

    Reducing the cost and complexity of Web Vulnerability Management

    Download Reducing the Cost and Complexity of Web Vulnerability Management to learn how using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.

    Provided By Symantec

  • White Papers // Oct 2012

    Security and Trust: The Backbone of Doing Business Over the Internet

    Download Security and Trust: The Backbone of Doing Business Over the Internet to learn about the importance of delivering a secure and trustworthy online experience.

    Provided By Symantec

  • White Papers // Oct 2012

    Internet Trust Marks: Building Confidence and Profit Online

    Download Internet Trust Marks: Building Confidence and Profit Online to find out how the use of trust marks can help drive sales, boost margins, and enhance an e-commerce site's competitiveness.

    Provided By Symantec

  • White Papers // Oct 2012

    How Extended Validation SSL Brings Confidence to Online Sales and Transactions

    Download How Extended Validation SSL Brings Confidence to Online Sales and Transactions for insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Against Firesheep and Sidejacking

    Download the white paper, Protecting Against Firesheep and Sidejacking that discusses the inherent insecurity of unprotected HTTP connections, the problems with the unsecured WiFi connections, and how an intelligent, resourceful, and motivated user could protect themselves against such threats.

    Provided By Symantec

  • White Papers // Oct 2012

    Spoofing Server-Server Communication: How You Can Prevent It

    Download Spoofing Server-Server Communication: How You Can Prevent It by Larry Seltzer - a MUST read for CIOs, CSOs, Network/System Administrators and Compliance Officers. It discusses new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication.

    Provided By Symantec

  • White Papers // Oct 2012

    The Shortcut Guide to Protecting Against Web Application Threats Using SSL

    Download The Shortcut Guide to Protecting Against Web Application Threats Using SSL to learn how SSL encryption can protect server to server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.

    Provided By Symantec

  • White Papers // Oct 2012

    Simplify SSL Certificate Management Across the Enterprise

    Download Simplify SSL Certificate Management Across the Enterprise to learn how to manage Certificates across an enterprise.

    Provided By Symantec

  • White Papers // Oct 2012

    Grow Your Business by Building Consumer Trust

    Download this FREE guide - Grow Your Business by Building Consumer Trust - and learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.

    Provided By Symantec

  • White Papers // Oct 2012

    Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today's Enterprise

    Download Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today's Enterprise to learn about the pitfalls associated with poor SSL Certificate management, why this poses risks to the enterprise and how enterprises can keep track of SSL Certificates effectively.

    Provided By Symantec

  • Resource Center // Jan 2009

    Symantec Backup Exec Challenge

    Symantec invites you to take the Backup Exec? Challenge. Answer six questions to receive an analysis of how your current backup solution compares to Symantec Backup Exec 12.5 and Symantec Backup Exec System Recovery 8.5.

    Provided By Symantec

  • White Papers // Dec 2011

    A Prescription for Privacy: What You Need to Know About Security Requirements for Electronic Health Records

    Download A Prescription for Privacy: What You Need To Know About Security Requirements for Electronic Health Records to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start...

    Provided By Symantec

  • White Papers // Oct 2012

    Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance

    Download Getting Ahead of the Compliance Curve: Adopting a Managed Approach to Web Security and Regulatory Compliance to learn about new regulatory requirements that impact website security and compliance, areas of enterprise cloud computing security risk and how to take a more proactive approach and plan for the rapidly evolving...

    Provided By Symantec

  • White Papers // Oct 2012

    Protecting Your Website With Always On SSL

    Download the white paper, Protecting Your Website With Always On SSL that discusses the imperative need for Always On SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations--Facebook, Google, PayPal and Twitter--that are leading the way with...

    Provided By Symantec

  • Case Studies // Aug 2010

    Legal Aid Center of Southern Nevada: Restoring Justice and Data Faster With Symantec and Kortek Solutions

    With 18,000 clients in the past year and demand growing, Legal Aid Center of Southern Nevada provides free legal advice and representation to low-income residents who can't afford an attorney. With a spike in the state's population growth and 11.2 percent of Southern Nevadans below the poverty line, these services...

    Provided By Symantec

  • White Papers // Oct 2012

    The Hidden Costs of Self-Signed Certificates

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Provided By Symantec