Symantec

Displaying 321-360 of 447 results

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Client Management Suite 7.0

    With the release of Altiris Client Management Suite 7.0, Symantec ushers in a new generation of client systems management. The presenter of this webcast shows some of the new and exciting features such as intelligent software management, integrated Cast of All Star technologies, power management, Windows, Mac and Linux support,...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • Webcasts // Mar 2009

    Storage Strategy for a Down Economy: Stop Buying Storage!

    Unlocking the "Hidden" storage capacity in most data centers may allow data center managers to avoid capacity upgrades for a year or more. The presenter of this webcast will provide a four-step prescription for identifying available capacity and utilizing it effectively. Moreover, this is not a stop-gap program but rather...

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Disaster Preparedness for Small Businesses: IT Strategies

    Small business requirements for IT solutions differ substantially from those of large businesses. A good IT solution provides contingent capacity, is simple and easy to operate. The presenter of this webcast discusses the vulnerabilities and threats that most directly affect the business. The presenter will share her recommendations for an...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • White Papers // Mar 2009

    Creating a Sustainable Infrastructure

    Compliance projects can bury organization in process and paperwork. Creating a sustainable compliance operation starts with using risk management to prioritize and continues with understanding how to leverage new technology in security, storage and networking infrastructure to create a true compliance infrastructure. The tools needed to become compliant are a...

    Provided By Symantec

  • Webcasts // Mar 2009

    Windows Disaster Recovery That's Affordable and Simple

    Disaster Recovery is often thought of as a complicated, time consuming and very costly process. As a result it's an IT project that often gets delayed in many organizations. But with Symantec Backup Exec System Recovery, one can implement a disaster recovery solution for the Windows environment that's cost effective,...

    Provided By Symantec

  • Webcasts // Mar 2009

    Do More With Less: A Healthcare Approach to Compliance Automation

    How to continue to protect sensitive information, spend less time and money on regulatory audit, and maintain operational excellence while dealing with flat or even declining IT budgets? The attendee will learn key strategies to mitigate risk, cut audit costs, and improve compliance efficiency as organizations head into 2009. The...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

    This whitepaper discusses the security aspects of archiving from Sharepoint with Enterprise Vault 8.0. It has discussed permissions required on SharePoint servers as well as their requirements in IIS. It also discusses the client access methods such as links and Web-parts. This whitepaper assumes the reader has already read the...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for File System Archiving

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory, NetApp Filers, and EMC Celerras. It also provides insight as to how to change some of the settings to be configured in line with organizational preferences....

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0 Security Model for Microsoft Exchange Archiving

    This whitepaper discusses the security aspects of archiving Exchange servers with Enterprise Vault 8.0. It has discussed the necessity for an Enterprise Vault service mailbox and the security around Journal archives and Vault Cache. It discussed end-user access to archived items from Outlook, OWA, and RPC over HTTP as well...

    Provided By Symantec

  • White Papers // Mar 2009

    Security Model for Compliance Accelerator 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and Internet Explorer. It will also provide insight as to how to configure Compliance department roles to be configured in line with organizational preferences. This whitepaper...

    Provided By Symantec

  • White Papers // Mar 2009

    How Enterprise Vault Supports Exchange 2007 High Availability Options

    This paper outlines the high availability options introduced in Exchange 2007, namely LCR, CCR and SCR, and discusses how Enterprise Vault supports them. This paper is intended only to position these technologies with respect to Enterprise Vault and is not intended to be a deep level technical discussion or a...

    Provided By Symantec

  • White Papers // Mar 2009

    Veritas Storage Foundation in a VMware ESX Environment: Linux and Solaris x64 Platforms

    This paper describes how to configure and use Veritas Storage Foundation in a VMware ESX environment. Because most features in Storage Foundation are supported in a VMware environment, this paper focuses on the features that work differently in a VMware environment and why certain features are not supported. The operating...

    Provided By Symantec

  • White Papers // Mar 2009

    How Veritas Storage Foundation Complements Microsoft Windows Server: Enhancing the Data Center

    Microsoft introduced several new storage management features in Windows Server 2003. In Windows Server 2008, they extend functionality to include the ability to shrink partitions and volumes online and DSMs to configure multi-pathing in iSCSI and FC environments. This paper will outline how Veritas Storage Foundation for Windows integrates and...

    Provided By Symantec

  • White Papers // Mar 2009

    Symantec Online Backup: Technical Brief

    Symantec Online Backup provides businesses with secure, affordable backup and recovery for PCs and servers over the Internet. Unlike on-premise backup solutions, Symantec Online Backup is an on-demand service that requires only a small agent on local computers. It automatically stores customer backup data in secure, off-site data centers managed...

    Provided By Symantec

  • Presentations // Mar 2009

    Learn How to Control Endpoints in this 3 minute video

    Security has evolved. It's no longer just about having anti-virus software and a firewall. Discover what critical steps and components you may be missing and how Symantec's Altiris endpoint management solutions can provide complete endpoint control and accelerate IT productivity and efficiency. View this product tour and register to download...

    Provided By Symantec

  • Webcasts // Feb 2009

    Solving Your Top 5 Microsoft Hyper-V Backup and Recovery Challenges

    Is the business planning to implement Microsoft Hyper-V in order to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several challenges. One of the biggest challenges is implementing a reliable backup and recovery solution to protect critical data distributed...

    Provided By Symantec

  • Webcasts // Feb 2009

    Creating a Protected Endpoint and Messaging Environment with Symantec Multi-tier Protection

    Over 12,000 new malicious code threads are detected every day and 80% of all email identified as spam, the need to ensure complete protection is more important than ever before. The presenter of this webcast will discuss how Symantec Multi-tier Protection creates a protected endpoint and messaging environment while controlling...

    Provided By Symantec

  • White Papers // Feb 2009

    Strategies to Increase Application Availability

    High-availability solutions are essential to maintain business continuity in today's 24x7 environment. But these solutions must be evaluated for their ability to address the business and technical needs of the organization in which they will be deployed. Through central management tools, automated failover, features to test disaster recovery plans without...

    Provided By Symantec

  • Webcasts // Feb 2009

    In These Economic Times, How Can Endpoint Data Loss Prevention Help You Protect Confidential Information?

    When the economy creates a challenge for companies, they might look to reduce costs or evaluate hiring strategies. If a company is looking to reduce its workforce, how has it prepared to protect its intellectual property, customer and employee data? Recent research has shown that employees who fear losing their...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Microsoft Exchange Archiving and Retention Policy Development Featuring Old Dominion University

    The presenter will detail Old Dominion University's Notes to Exchange Migration which featured a Deployment of Microsoft Exchange 2007 and Symantec Enterprise Vault. The presenters will discuss few points such as deletion vs. Retention, exchange retention folders and archiving, records vs. non records and gives tips for simplifying the retention...

    Provided By Symantec

  • White Papers // Feb 2009

    Compliance Rules: Rules and Tools, Policies and Best Practices for Cost-Effective, Comprehensive Compliance in the United States

    Organizations of all types and sizes, industries and professions have long been mindful of the need for legal and regulatory compliance. In the current economic environment, however, forward-thinking organizations now are shifting their focus somewhat. Mere adherence to laws and regulations is no longer enough. Thanks to tight economic conditions...

    Provided By Symantec

  • Webcasts // Feb 2009

    How to Do More With Less When Protecting Microsoft Exchange With Veritas NetBackup

    With everyone being asked to do more with less why shouldn't the backup application be asked the same? Symantec's Granular Recovery Technology eliminates MAPI backups and allows for the quick recovery of individual email messages and the entire application. The attendee will learn how to shorten the recovery time, backup...

    Provided By Symantec

  • Webcasts // Feb 2009

    Running Backups on a Budget - Protecting Your Data and the Bottom Line!

    Data volumes increase while IT budgets decrease. Efficiently leverage the Backup Exec Family to keep critical data protected and easily meets recovery point objectives without breaking the budget. The attendee will learn how to reduce storage utilization by more than 50% with patent pending granular recovery technology.

    Provided By Symantec

  • White Papers // Feb 2009

    A Storage Strategy for Tough Times

    In the current economic downturn, IT departments are being tasked to do more with less. And that means taking steps now to optimize existing storage assets. The good news is that the situation presents an opportunity to implement processes, procedures, and simple technologies to significantly reduce storage costs. Symantec is...

    Provided By Symantec

  • White Papers // Feb 2009

    Protection You Can Count On

    For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company's bottom line if that data isn't protected. SMBs should...

    Provided By Symantec

  • Webcasts // Feb 2009

    Small Business Backup: Your Data May Not Be as Protected as You Think

    The loss of critical data can be crippling to any business, still many small and mid-size companies do not adequately backup their data. An independent study conducted, reveals the pitfalls of poorly implemented backup strategies - and the real world consequences of unexpected data loss. This new study illuminates the...

    Provided By Symantec

  • Webcasts // Feb 2009

    Best Practices for Managing Business Risks From the Use of IT

    The presenter of this webcast focuses on the relationship between business risks and use of IT. The presenter of this webcast throws light on key business risks from the use of IT, financial outcomes and self-insurance thresholds and outcomes by industry and size of organization.

    Provided By Symantec

  • White Papers // Feb 2009

    Top 5 Security Tips for 2009

    Email, internet usage and electronic communication are used more and more in everyday business. In fact, one could say they are an absolutely essential tool for any organization today. They've brought a whole new world of ways to save money, time and hassle - from online banking to instant messaging...

    Provided By Symantec

  • Webcasts // Feb 2009

    Why Is Off-Site Data Storage Important?

    Many small and medium sized businesses view off-site data protection services as a costly and unnecessary investment. However, new regulations, requirements and advancements have made off-site data a greater consideration. The presenter of this webcast examines off-site data storage and its role in disaster protection. Why is it necessary and...

    Provided By Symantec

  • Webcasts // Feb 2009

    Epic Games Deploys Serious Archiving Technology With Enterprise Vault

    The attendee of this webcast will learn more about how Epic leveraged Symantec Enterprise Vault with Microsoft Exchange 2007 to meet storage optimization and E-Discovery demands. After utilizing archiving solutions from EMC and Mimosa, Epic Games migrated to Symantec Enterprise Vault and Discovery Accelerator.

    Provided By Symantec

  • Webcasts // Feb 2009

    Top 7 Backup Mistakes to Avoid in Windows Environment

    There are several common backup/restore mistakes that could be costing the money and even putting the business data at risk. The attendee will learn how Backup Exec for Windows 12.5 and Backup Exec System Recovery 8.5 can help to avoid these common backup mistakes in Windows environments.

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault Automatic Classification Engine Enterprise Vault 8.0

    The Automatic Classification Engine was designed for organizations that do not want to rely on users to make classification decisions or impact their productivity. ACE is an ideal solution for applying context to an organization's archived data in the form of retention and searchable policies. Items classified by these policies...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) Intelligent Archiving solutions integrate with security features already built into Active Directory, SQL, and Enterprise Vault. It will also show how to manage access to the applications securely in line with organizational preferences. This whitepaper is...

    Provided By Symantec

  • White Papers // Feb 2009

    Intelligent Archiving With Enterprise Vault 8.0

    Enterprise Vault has many options to choose from when determining an Intelligent Archiving strategy. Either from an automatic, non-user impact, perspective or through extensions to an organization's current ECM solutions, Symantec can provide a solution that can meet the organization's needs to provide context to its archived data. With the...

    Provided By Symantec

  • White Papers // Feb 2009

    Security Model for Enterprise Vault 8.0 and SQL Server

    This whitepaper discusses a large majority of the security aspects of Enterprise Vault 8.0. It discusses how it keeps information secure from unauthorized viewing and how it secures store archived data and indexes. It also discusses administrative features like Roles Based administration, Auditing, and remote administration. Other relevant topics such...

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • Webcasts // Jan 2012

    Symantec Data Loss Prevention for Mobile

    In this webcast, the presenter shares his enterprises need to protect confidential data wherever it resides - even on tablet computers like the iPad. The presenter also the uses of Symantec Data Loss Prevention for Mobile.

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • Webcasts // Aug 2009

    Achieve "Proactive Compliance" Through Automation

    The presenter of this webcast examines how the organization can achieve "Proactive compliance" by standardizing on IT controls and automating the compliance process. Leveraging a Capability Maturity Model as a framework, the presenter will discuss solutions which can be deployed to help to reach this goal. The presenter will also...

    Provided By Symantec

  • Webcasts // Aug 2009

    Expand Your Data Recovery Capabilities With Complete System Protection

    Organizations around the world trust market leading Symantec Backup Exec technology to protect business critical applications and data, but how to backup and recover entire servers or desktops in the event of a failure or disaster? The attendee of this webcast will discover how Backup Exec System Recovery complements and...

    Provided By Symantec

  • Webcasts // Aug 2009

    Introducing Symantec Workflow 7.0

    Effective process is the life blood of business. But inefficient, inflexible, and manual processes can inhibit the flow of business and affect the bottom line. The presenters of this webcast shows the latest innovations introduced with Symantec Workflow 7.0 that help as an IT professional automate IT and business processes...

    Provided By Symantec

  • Webcasts // Jul 2009

    Using Best Practices to Comply With NERC Cyber Security Compliance

    Electric power companies face increasing regulatory requirements, including NERC CIP, Sarbanes Oxley and others. To maintain these regulations can be costly and time-consuming. Moreover, 2009 is a critical year for energy and utility companies as The North American Electric Reliability Corporation (NERC) regulations require that utilities be "compliant" by July...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure and Manage the Endpoint With Altiris Client Management Suite

    90% of incidents would not have happened if the endpoints simple had the appropriate patch installed? Good systems management is key to protecting the systems from vulnerabilities. The attendee will learn how to configure and protect the endpoint using Altiris Client Management Suite. This industry-leading product will help as an...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jul 2009

    The Economics of Green IT: Start Saving Money

    CIOs pay millions of dollars a year to power and cool data centers. Many enterprises, some for the first time this year, have shifted the energy bill from facilities to IT, with the hope - and expectation - that IT can lower energy costs. In addition, many enterprises seek to...

    Provided By Symantec

  • Webcasts // Jul 2009

    Put Data Storage on a Diet With Symantec Deduplication

    If there's one absolute in business, it's that data will continue to grow. Organizations of all sizes around the world wrestle with an ever-growing array of information management headaches, storage concerns and recovery needs. And increasingly, organizations are turning to data deduplication to address these issues. But how one will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec APJ Internet Security Threat Report Trends for 2008

    The Symantec APJ Internet Security Threat Report provides an annual overview and analysis of Internet threat activity, a review of known vulnerabilities, and highlights of malicious code in the Asia-Pacific/Japan (APJ) region. Trends in phishing and spam are also assessed. Previously, Symantec presented data on a six-month basis. This volume...

    Provided By Symantec

  • Webcasts // Sep 2009

    Dedupe - How to Be a Hero With NetBackup

    Do More With Less - how many times has management tasked to do that? Well with the NetBackup Platform one really can. With the data deduplication capabilities of NetBackup PureDisk one can protect more and store less - up to 8x more than other deduplication products on comparable server hardware....

    Provided By Symantec

  • Webcasts // Sep 2009

    Prevent Security Breaches by Protecting Information Proactively

    Which organizations want to be in the news because of a security breach? Threats to corporate information continue to increase and IT organizations now have to worry about internal and external attack vectors - including employees who may either intentionally or accidentally risk critical information. Loss of this critical information...

    Provided By Symantec

  • Webcasts // Sep 2009

    Manage and Secure Your Mobile Devices Efficiently

    The attendee of this webcast will learn how Symantec makes it easy to manage and secure mobile devices efficiently. A priority for IT organizations is to efficiently secure all their endpoints and gain confidence that corporate assets and business operations are protected and updated - all while controlling costs. After...

    Provided By Symantec

  • Webcasts // Sep 2009

    Reduce Costs With Good Systems Management Practices in Hard Economic Times

    As budgets are being slashed, IT is still expected to do more with less to support the business. With good systems management practices in place using products from Symantec such as Altiris Client Management Suite, IT professionals can reduce overall costs of owning PCs throughout their organization. This webcast will...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • Webcasts // Aug 2009

    Automating Server Management Processes With Workflow

    This webcast will discuss the benefits of automation, or workflow, within an IT department to help reduce the time that administrators spend on mundane, repetitive and manual tasks. The webcast will highlight the Altiris Workflow Solution and give several real-world examples of how server focused IT processes can be automated...

    Provided By Symantec

  • White Papers // Aug 2009

    Medicaid MITA: Innovative COTS Solutions for IT Risk Management

    This paper provides an overview of the MITA Technical Architecture and discusses key areas of potential contribution to implementation of this framework from one the world's leading IT security and infrastructures software solution providers, Symantec. The goal of this paper is to facilitate discussion and familiarization of the Symantec Commercial...

    Provided By Symantec

  • White Papers // Jan 2009

    Choosing a Cost-Effective Email Security Solution: In Turbulent Economic Times

    Managing a portfolio of IT projects is one of the most complex, costly and resource intensive activities that organizations face. In today's sluggish economy, many companies are facing IT budget cuts, which means it's essential to make every IT dollar stretch further. With a limited budget come limited resources to...

    Provided By Symantec

  • White Papers // Feb 2009

    New Web Threats in 2009

    The new web borne threats attacking business networks are more intense and sophisticated than ever. Techniques using rich media, open source platforms, web 2.0 collaboration tools; social networking sites and a host of emerging technologies expose networks to a new breed of web security threats. This paper provides an overview...

    Provided By Symantec

  • White Papers // Nov 2008

    Web Use and Misuse

    Three out of four employers have had to deal with employees who waste time online, according to a recent survey by Employment Review magazine1. Companies had problems with employees misusing email, blogs and damaging comments about the company posted online. A large proportion of corporate web traffic is for non-work...

    Provided By Symantec

  • White Papers // Nov 2008

    Email Retention and Archiving: Manage Electronic Records, Minimize Workplace Risks and Maximize Compliance

    Without question, email has become the business world's communication tool of choice, forever altering the ways in which it exchange information and conduct professional relationships. Consequently, many employers find themselves drowning in email-related risks as they struggle to manage the use - and curtail the abuse - of what was...

    Provided By Symantec

  • White Papers // Jun 2009

    Converged Threats on the Security Landscape

    The pervasive presence of malware on the Internet today creates more opportunities for mixing and matching dangerous content than has ever been possible. The essence of a converged threat is the combination of viruses, spyware, phishing, spam and other attempts at attack or exploitation of vulnerabilities that can disrupt networks...

    Provided By Symantec

  • White Papers // Sep 2009

    5 Steps Every Business Can Take to Guard Against Botnets

    Robot networks and zombie armies may sound like names from science fiction. Unfortunately, they identify actual threats to information systems across the globe. By secretly invading business Internet connections, hackers and spammers can download harmful software, including spyware and computer viruses, onto computers and laptops. These malicious programs turn ordinary...

    Provided By Symantec

  • Webcasts // Nov 2009

    Overview on SP1 Release for Storage Foundation and High Availability for Windows 5.1

    Storage Foundation and High Availability for Windows 5.1 will be releasing Service Pack 1 (SP1) in November. This SP1 release includes an eye-popping list of extended features and additional functionality that enables this product to maintain its competitive edge in the storage management and availability space for the Windows environment....

    Provided By Symantec

  • Webcasts // Nov 2009

    Get the Most Return From Your Backup Exec Investment

    Anyone on an older version of Backup Exec may be missing out on valuable backup and recovery advantages achieved by simply upgrading. Recent internal performance testing proves that by simply upgrading to the latest version of Backup Exec 12.5, one can experience a 50-100% increase in backup performance. Symantec Backup...

    Provided By Symantec

  • Webcasts // Nov 2009

    Mind the Gap: What 3rd Party Archiving Brings to Your Exchange Environment

    There are a lot of messages, storage, backups, policies, and people to manage just to maintain the current state of email and make sure it's accessible to those who need it, when they need it. Many organizations need more than the archiving functionality that will be available within Exchange 2010....

    Provided By Symantec

  • Webcasts // Nov 2009

    Windows Virtualization - Crossing the Data Protection Divide With NetBackup

    As more companies move to virtualization to control spiraling IT costs, virtual machines are taking on more mission-critical workloads as Microsoft Exchange, SQL, SharePoint, and Active Directory. Protecting such application, data, and storage-intensive environments takes on a whole new set of complexities, and typically requires a whole new set of...

    Provided By Symantec

  • Webcasts // Nov 2009

    Five Things You Wish You Knew Before You Virtualized

    The reality of deploying virtualization is that it can also increase the complexity and cost of managing the applications and servers. As Virtual Machines (VMs) proliferate - storage growth, data protection, and application and data recovery are just a few detours that can impact the business' bottom line. Without an...

    Provided By Symantec