Symantec

Displaying 321-360 of 533 results

  • White Papers // May 2009

    Top Benefits of Symantec Protection Suite

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Find out how you can protect against zero-day threats, safeguard intellectual property and ensure compliance. Tired of all the false positives you get with anti-phishing products? See...

    Provided By Symantec

  • Webcasts // Apr 2009

    Symantec Internet Security Threat Report Volume XIV - Key Facts and Figures

    The Internet threat landscape continues to challenge the organization's information with increasingly complex and sophisticated attacks. This is making it even more important to have access to global threat intelligence that can assist in making informed decision on how best to protect the company's assets. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Apr 2009

    Containing Vendor Sprawl: Improve Security, Reduce Risk & Lower Costs

    The presenter of this webcast will explain the cost of managing multiple vendors across disparate products and outline the benefits of consolidating security, storage, and systems management solutions with one strategic vendor. The attendee of this webcast will learn about top security challenges in the next 12 months and how...

    Provided By Symantec

  • White Papers // Apr 2009

    Are You Getting the Best Security for Your Money?

    Managing and protecting every device in an enterprise isn't easy. But an enterprise puts itself at risk if its IT organization lacks the visibility to protect the business' sensitive information, wherever it may be. Such visibility is not possible with a patchwork of security point products .To ensure that their...

    Provided By Symantec

  • White Papers // Apr 2009

    Fast Memory State Synchronization for Virtualization-Based Fault Tolerance

    Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating systems. While initial prototypes show promise virtualization-based fault-tolerant architecture still experiences substantial performance overhead especially for data-intensive workloads. The main performance challenge of virtualization-based fault...

    Provided By Symantec

  • Webcasts // Apr 2009

    Stop Buying Storage - Part 3: Controlling Email and File Server Growth and Costs With Intelligent Archiving

    Sometimes feel overwhelmed with what feels like a continuous barrage of information growth? According to IDC 54% of the storage capacity added by organizations in 2008 will be dedicated to the storage of file-based data and projected grow to 75% by 2011. The presenter of this webcast will discuss how...

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • Webcasts // Apr 2009

    Stop Buying Storage - Part 2: Maximize Storage Assets With Thin Provisioning, Tiered Storage, and Cluster File Systems

    Thin Provisioning represents an opportunity to immediately optimize the storage systems and make more capacity available to the applications. Although thin provisioning is a storage array feature, servers need to be 'Thin aware'. In order to migrate from "Thick" to "Thin," one need tools that makes the transition seamlessly and...

    Provided By Symantec

  • Webcasts // Apr 2009

    Data Protection Reporting for Your Virtual Machines

    Veritas Backup Reporter (VBR) provides the better insight into the virtual machine backups. Which virtual machines are or most error prone? How much faster do the VCB (VMware Consolidated Backups) finish compared to the traditional backup clients running inside the virtual machines? How much data is backing up for each...

    Provided By Symantec

  • Webcasts // Apr 2009

    Stop Buying Storage - Part 1: Reporting, Managing Change and Other Strategies to Increase the Utilization of Existing Storage Assets

    Visibility into how storage resources are being utilized in the data center is a top priority. Before any analysis of the storage environment can be accomplished, IT professionals must be able to accurately assess the availability and usage of resources. Veritas CommandCentral Storage helps companies make this assessment and provides...

    Provided By Symantec

  • White Papers // Apr 2009

    Enterprise Vault 8.0: Technical Overview

    Unstructured content like email and files are a huge management problem for companies of all sizes. The growth of this information in the form of email and files on storage devices and frontline servers are causing headaches as companies attempt to manage IT risk but maximize performance. This whitepaper has...

    Provided By Symantec

  • White Papers // Apr 2009

    The 12 Business Benefits of Workspace Virtualization: For Cash-Strapped Financial Institutions, Bottom-Line Cost Savings Come With Added Manageability and Security Perks

    Workspace or endpoint virtualization is a centrally-controlled computing model for which applications are served up to individual desktops. "It offers an 'implement once, deploy many' approach to winning control over one of the most onerous security challenges in business? Institutions benefit from configuration and change control that directly addresses the...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 1 - Solution Overview

    This whitepaper provides a high-level overview of the PST problem, the issues with PST migration, and how the PST migration tools available in Enterprise Vault can solve them. PST files (also known as Personal Folders or Outlook data files) were not designed to handle the rigorous demands of today's large-scale...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 3 - Planning, Tech Tips & Best Practice

    This whitepaper looks at some important aspects of a PST migration project; namely, planning and best practice usage of the tools in different migration scenarios. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. One of the key decisions when planning PST migration is choosing the...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec

  • White Papers // Apr 2009

    Can Heuristic Technology Help Your Company Fight Viruses?

    Electronic communication, which is an essential tool for businesses, is increasingly at risk due to the sophistication of email and web threats. Converging threats, combining viruses, spam and the web, to defraud unsuspecting victims or to disseminate malware make implementing reliable, effective protection essential for the corporate network and remote...

    Provided By Symantec

  • Webcasts // Apr 2009

    Minimizing Risk - Will Your High Availability/Disaster Recovery Plan Work?

    Configuration drift is a major problem that IT professionals face and must manage in the event a disaster occurs. To address this issue, Symantec is introducing Veritas CommandCentral Disaster Recovery Advisor, an agentless solution that supports all major computing platforms. Disaster Recovery Advisor scans data center infrastructure to detect any...

    Provided By Symantec

  • White Papers // Apr 2009

    Five Critical Recovery Flaws Your Last Disaster Recovery Test Missed

    Businesses today are spending millions of dollars to develop and maintain Disaster Recovery (DR) infrastructures that will ensure business continuity. But despite such huge investments of time and resources, most IT professionals are still not completely confident in their ability to recover in an emergency. This paper examines how automated...

    Provided By Symantec

  • White Papers // Apr 2009

    Premium Support Services Deliver: The Return on Investment for Symantec Business Critical Services

    Given today's challenging economic climate, companies across a wide range of industries are focusing on staying financially sound, serving markets and customers, and doing more with less. Reducing and controlling costs is a particularly strong area of emphasis across all functional areas, especially IT operations. This white paper is intended...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec Brightmail Gateway v8.0

    The ongoing issue facing messaging administrators is how to preserve the value of messaging in light of escalating security threats and compliance requirements. Organizations are seeing an increased need for integrated secure content and threat management solutions that address multiple threats in a single solution. The Symantec Brightmail Gateway (Brightmail...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec APJ Internet Security Threat Report Trends for 2008

    The Symantec APJ Internet Security Threat Report provides an annual overview and analysis of Internet threat activity, a review of known vulnerabilities, and highlights of malicious code in the Asia-Pacific/Japan (APJ) region. Trends in phishing and spam are also assessed. Previously, Symantec presented data on a six-month basis. This volume...

    Provided By Symantec

  • White Papers // Apr 2009

    Veritas CommandCentral - Supporting the Virtual Enterprise

    Veritas CommandCentral is an enterprise storage management solution that provides the ability to manage storage effectively not only in the physical environment, but in the virtual environment as well. As organizations evaluate different physical and virtual solutions, it is imperative to consider the management implications of server and storage virtualization....

    Provided By Symantec

  • Webcasts // Mar 2009

    Case Study: Best Practices in Endpoint Security: How a Leading Company Secured Their Endpoints and Infrastructure Using Symantec Services

    The attendee will learn the best practices and deployment strategy for a Symantec Network Access Control (SNAC)-based solution for a State agency. The agency had to provide non-employees network access to the internet and public records databases, while at the same time providing network access (to highly confidential data) to...

    Provided By Symantec

  • White Papers // Mar 2009

    Risk, Readiness and Redundancy: PCI Compliance Automation With Symantec Control Compliance Suite

    For most of this decade, the major credit card companies have been aggressively developing standards to establish a common approach to protect the privacy and security of sensitive credit card data. In June 2001, Visa mandated the Cardholder Information Security Program (CISP) for merchants and financial institutions handling its card...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right: Cost, Risk and Readiness

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • White Papers // Mar 2009

    Future-Proof Your IT Infrastructure

    Today's tough economic climate is challenging companies to reduce costs while continuing to focus on improving efficiencies. For IT departments everywhere, it's truly a "do more with less" dilemma. Client and server management suites from Symantec allow organizations to significantly reduce the hidden costs of managing endpoint systems throughout the...

    Provided By Symantec

  • Webcasts // Mar 2009

    Data Loss During Downsizing: When Employees Exit, so Does Data

    The presenter of this webcast addresses "Data Loss During Downsizing," the results of a survey conducted by the Ponemon Institute. In these tough economic times, many companies are going through layoffs or downsizing. According to the results, more than half of ex-employees admit to stealing company data. The attendee will...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Server Management Suite 7.0

    With the launch of Altiris Server Management Suite 7.0, Symantec supplies the essentials for server management. The attendee will learn about the new and exciting features for servers from the new approach to server monitoring and enhanced proven technologies in server inventory to device discovery, server provisioning, and software and...

    Provided By Symantec

  • Webcasts // Mar 2009

    NEW Backup Exec Infrastructure Manager 12.5 - Managing Your Backup Exec Environment With Ease

    The presenter of this webcast gives a technical overview and demonstration of the NEW Backup Exec Infrastructure Manager 12.5, the latest addition to the Backup Exec family. Backup Exec Infrastructure Manager (powered by Altiris technology) delivers great benefits, simplifying the automation, deployment, and updating, upgrades, and licenses management of Backup...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Client Management Suite 7.0

    With the release of Altiris Client Management Suite 7.0, Symantec ushers in a new generation of client systems management. The presenter of this webcast shows some of the new and exciting features such as intelligent software management, integrated Cast of All Star technologies, power management, Windows, Mac and Linux support,...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • Webcasts // Mar 2009

    Storage Strategy for a Down Economy: Stop Buying Storage!

    Unlocking the "Hidden" storage capacity in most data centers may allow data center managers to avoid capacity upgrades for a year or more. The presenter of this webcast will provide a four-step prescription for identifying available capacity and utilizing it effectively. Moreover, this is not a stop-gap program but rather...

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Disaster Preparedness for Small Businesses: IT Strategies

    Small business requirements for IT solutions differ substantially from those of large businesses. A good IT solution provides contingent capacity, is simple and easy to operate. The presenter of this webcast discusses the vulnerabilities and threats that most directly affect the business. The presenter will share her recommendations for an...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • White Papers // Mar 2009

    Creating a Sustainable Infrastructure

    Compliance projects can bury organization in process and paperwork. Creating a sustainable compliance operation starts with using risk management to prioritize and continues with understanding how to leverage new technology in security, storage and networking infrastructure to create a true compliance infrastructure. The tools needed to become compliant are a...

    Provided By Symantec

  • Webcasts // Mar 2009

    Windows Disaster Recovery That's Affordable and Simple

    Disaster Recovery is often thought of as a complicated, time consuming and very costly process. As a result it's an IT project that often gets delayed in many organizations. But with Symantec Backup Exec System Recovery, one can implement a disaster recovery solution for the Windows environment that's cost effective,...

    Provided By Symantec

  • White Papers // Aug 2008

    Security 2.0: A Vision and Strategy for Information-Centric Security

    For years organizations have been transforming their operations to fit a world that is becoming more open and more connected. They want to take greater advantage of the increased flexibility and collaboration that the Internet makes possible, yet at the same time they must protect themselves from the new and...

    Provided By Symantec

  • White Papers // Jan 2010

    Securing Your Company's Confidential Data

    Data volume is on the rise. Companies are collecting and storing more information than ever - about employees, customers, transactions, partners and assets. And this data is being accessed and shared in new ways such as through mobile devices and collaboration technologies. It's becoming increasingly important for companies to protect...

    Provided By Symantec

  • White Papers // Nov 2008

    Why Premium Support Is More Effective Than Standard Support in the Financial Services Industry

    Financial services industry customers are challenged as never before to respond quickly - armed as they are with limited budgets - to accommodate rapid changes in technology and customer demand. To be a winner in this field, companies must be able to guarantee a level of service quality and continuity...

    Provided By Symantec

  • White Papers // Apr 2010

    Symantec Internet Security Threat Report: Trends for 2009

    This summary will discuss current trends, impending threats, and the continuing evolution of the Internet threat landscape in 2009 based on data discussed within the Symantec Global Internet Security Threat Report. There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec...

    Provided By Symantec

  • White Papers // Aug 2008

    Ten Reasons to Use Symantec Online Backup

    Backups are not a glamorous, high-profile task in any business. In a small or medium-sized business where money and staff time are at a premium, there is always something more pressing to do than backing up data. Accordingly, many businesses operate with backup processes that that are incomplete or inadequate...

    Provided By Symantec

  • Case Studies // Jan 2010

    Mitigating Against Security Risks and Ensuring IT Compliance - All at Reduced Cost

    It doesn't matter how fast a financial services organization is growing, how many new services are being introduced, or how quickly new customers are coming on board. One theme remains of paramount importance: reducing IT risk and achieving compliance objectives. For Abu Dhabi Commercial Bank (ADCB) these same principles apply,...

    Provided By Symantec

  • Case Studies // May 2009

    Leading Express Delivery Service Provider Automates System Administration With Symantec

    Every night, DHL processes more than 1,500 metric tons of freight at its hub in Leipzig. This volume demands a stable IT infrastructure that administrators can manage efficiently from a central location. The DHL Hub Leipzig GmbH does this with the help of a Symantec solution which is used to...

    Provided By Symantec

  • Case Studies // Apr 2010

    Symantec Case Study: Noel Leeming Group Limited

    With over 90 retail stores across New Zealand, Noel Leeming Group's success is built on its technology expertise and superior customer service. They wanted centralized IT team servicing decentralized users also In-house software incorrectly delaying genuine business emails. To master these challenges they turned MessageLab. MessageLabs Hosted Email AntiSpam, AntiVirus...

    Provided By Symantec

  • Case Studies // Mar 2010

    Cholet Town Hall Gains a Secure Information System With Symantec

    With an information system linking 40 sites across the region, a broad diversity of access points, and nearly 100 third-party applications, Cholet Town Hall was faced with a complex problem when it came to endpoint security. The French local authority therefore implemented a global solution combining Symantec Endpoint Protection, Symantec...

    Provided By Symantec

  • Case Studies // Aug 2010

    Legal Aid Center of Southern Nevada: Restoring Justice and Data Faster With Symantec and Kortek Solutions

    With 18,000 clients in the past year and demand growing, Legal Aid Center of Southern Nevada provides free legal advice and representation to low-income residents who can't afford an attorney. With a spike in the state's population growth and 11.2 percent of Southern Nevadans below the poverty line, these services...

    Provided By Symantec

  • Webcasts // Jan 2010

    Backing Up VMware: Benchmarks and Best Practices With NetBackup and Cisco

    VMware's new vStorage API for Data Protection has revolutionized virtual machine protection, however, to fully realize these capabilities one needs the proper tools. Symantec and Cisco have teamed up to show how using Symantec NetBackup 7's native integration with the vStorage API and Cisco's Unified Computing System (UCS) architecture can...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec Endpoint Protection

    In this webcast, the presenter will discuss the latest release of Symantec Endpoint Protection (SEP). This release includes new features in such areas as central management, virtualization support, new OS, and new recovery options. If one is responsible for managing or supporting SEP or want to stay on top of...

    Provided By Symantec

  • Webcasts // Jan 2010

    Overview on the Latest Deduplication Solution by Symantec, NetBackup 5000

    Symantec understands the shifting needs of the data center and has now launched a new deduplication appliance, NetBackup 5000, as an additional option for customers to leverage with their backup strategy and to help maintain information growth within their environment. NetBackup 5000 simplifies the deployment of deduplication to existing NetBackup...

    Provided By Symantec

  • White Papers // Oct 2010

    W32.Stuxnet Dossier

    W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats the author have analyzed. In this paper the author take a detailed look at Stuxnet and its various components and particularly focus on the...

    Provided By Symantec

  • White Papers // Oct 2010

    Reputation-Based Security an Analysis of Real World Effectiveness

    In September of 2009, Symantec released its first reputation based security offering as a part of its consumer security products. They have given us insight into the types of threats that can be effectively detected using a reputation system and they have helped us to understand how to adjust the...

    Provided By Symantec

  • Webcasts // Jan 2010

    Complete Protection Without Compromise

    One faces formidable challenges every day balancing the need for security and increased data protection with the flexibility demanded by the rest of the organization. Strategy can take a backseat while one concentrates on day-to-day firefighting. One thing a person shouldn't have to do is compromise the security and availability...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Smart Route to Windows 7

    As businesses review their upcoming migration to Windows 7, it is essential to review not only the migration tools but the entire IT infrastructure and areas in which efficiencies can be gained to make this a truly transformative event. Businesses should review their Windows 7 client security strategy to ensure...

    Provided By Symantec

  • Webcasts // Jan 2010

    Your Business Is at Risk. Protect It Completely

    What would happen to the business if one lost the customer data? If company records or intellectual property were stolen? It is estimated that 42% of small business customers have switched vendors because of the business's unreliable computing system. In this economy - when retaining every customer is key to...

    Provided By Symantec

  • Webcasts // Jan 2010

    Secure and Manage Your Data in Amazon's Cloud

    Moving all or part of the infrastructure to Amazon's Elastic Compute Cloud? Then one is also considering how to protect and manage the cloud storage online. This webcast gives answers around securing the information in the cloud. View now, have confidence in the cloud.

    Provided By Symantec

  • Webcasts // Jan 2010

    Information Governance in the Cloud

    Despite widespread interest in adopting cloud computing technologies, many organizations are "Flying blind" with respect to making them secure, potentially putting their operations, intellectual property and customer information at risk. Sponsored by Symantec, Ponemon Institute, a leading privacy and information management research firm, independently conducted a national study, Flying Blind...

    Provided By Symantec

  • Webcasts // Jan 2010

    Store Efficiently - Spend Less on Storage and Optimize What You Have

    Most organizations today are faced with the difficult challenge of managing explosive data growth. Adding to that challenge is the problem of poor storage utilization rates, which typically hover around 30-40% for most organizations. The end result is intense pressure on IT organizations to contain skyrocketing storage costs while dealing...

    Provided By Symantec

  • Webcasts // Jan 2010

    Top 10 Backup Mistakes in Virtual Environments? And How to Avoid Them!

    As enterprises embrace virtualization, their broader IT infrastructure is also shifting. One of the most significant areas of change is in how data and systems are protected. Common mistakes in data protection strategies for virtualized environments are costly and create business risks. Enterprises need to balance their backup strategies with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Ensuring 24 X 7 Data and Infrastructure Availability

    As businesses demand higher service levels and IT budgets remain flat, ensuring 24 x 7 data and infrastructure availability is not an easy task. Simply relying on people and manual recovery processes can be very risky in today's competitive business climate. Symantec addresses these issues with solutions that: Provide automatic...

    Provided By Symantec

  • Webcasts // Jan 2010

    Unified IT Security Management With Symantec Protection Center and Symantec Protection Suites

    Symantec Protection Center and Symantec Protection Suite introduce a new way organizations will realize the benefits of intelligent management and unified security solutions in today's complex IT infrastructures. Minimal insight into the threats the environment faces, slow responses to security incidents when they take place and a lack of automation...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce the Cost and Complexity of Compliance

    Is the regulatory compliance program costly and time-consuming? Is one having trouble providing ongoing support for audits? Does one have the resources to keep up with ever-changing regulations and industry standards? What about the overall IT risk posture?. Does one know if all the IT assets are properly protected? Can...

    Provided By Symantec

  • Webcasts // Jan 2010

    Effective Strategies for Domino Backup, Archiving, and Recovery

    Backup vs. Archiving? Recovery vs. Discovery? Which keeps the employees productive and which keeps the Legal department off one's back? In this webcast the presenter looks at backup, archiving, and recovery for the Domino environment. The presenter will discuss the business needs driving these areas as well as identify technical...

    Provided By Symantec

  • Webcasts // Jan 2010

    Carve Out IT Budget Through Better Software Management

    Software is one of the more expensive components of an IT budget. Keeping track of who has the software, who pays for it, and who uses it can become very complex. Does one have to prepare for an upcoming software vendor audit? Is it the time to renew expensive software?...

    Provided By Symantec

  • Webcasts // Jan 2010

    Is Social Networking Foiling Your Security Practice?

    This educational webcast teaches how the attendee can "Go social" without going sleepless. Social networking is rapidly evolving into one of the biggest threats to data security out there today. But the reality is, this medium is also a great way for the employees to collaborate and communicate. The challenge...

    Provided By Symantec

  • White Papers // Sep 2009

    The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

    In today's turbulent economy, midsize and enterprise organizations are faced with increasingly tough challenges. Due to flat or shrinking budgets, many IT departments are coming under pressure to do more with less, all while expectations for greater IT responsiveness to organizational demands continue to rise. Adding further complication to an...

    Provided By Symantec

  • White Papers // Apr 2009

    Symantec Brightmail Gateway v8.0

    The ongoing issue facing messaging administrators is how to preserve the value of messaging in light of escalating security threats and compliance requirements. Organizations are seeing an increased need for integrated secure content and threat management solutions that address multiple threats in a single solution. The Symantec Brightmail Gateway (Brightmail...

    Provided By Symantec

  • White Papers // Aug 2009

    SMB Protection Gap: SMB Security and Data Protection: Survey Shows High Concern, Less Action

    Small and mid-size businesses (SMBs) are major contributors to business innovation, value, and growth-many expect them to take the lead in global economic recovery. So a 2009 survey showing widespread and serious information security vulnerabilities in this crucial business segment is cause for genuine alarm. This paper will outline that...

    Provided By Symantec

  • White Papers // Nov 2009

    Security and Privacy for Healthcare Providers

    As healthcare providers automate their medical records, clinical systems, and medical imaging, protecting the privacy of patient information and securing IT infrastructures is becoming increasingly challenging. Healthcare organizations are facing more security threats that increase the risks of inappropriate access to patient information, inability to access the information, and impaired...

    Provided By Symantec

  • White Papers // Jan 2010

    A Practical Approach to Information Management

    Information is the fundamental connecting fabric of businesses today. Businesses rely on information technology and systems to run their business and help to drive new opportunities, as well as to operate efficiently and comply with corporate governance practices and industry regulations. Yet most organizations today are not organized around information,...

    Provided By Symantec

  • White Papers // May 2010

    Symantec Intelligence Quarterly

    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. More than 240,000 sensors in over 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec Deep Sight Threat Management...

    Provided By Symantec

  • White Papers // Feb 2010

    Backup Exec 2010: Deduplication Option

    Customers of all sizes and needs are seeking new ways to tackle their data protection challenges. While the challenges of data growth are not new, the pace of growth has become more rapid, the location of data more dispersed, and linkages between data sets more complex. Data reduplication offers companies...

    Provided By Symantec

  • Webcasts // Dec 2009

    Backup and Recover Your VMware and Hyper-V Machines in Seconds

    Whether considering implementing a virtual environment or are already experiencing the benefits of virtualization, backing up and recovering the guest machines, files and folders in a virtual environment is a new challenge one have to solve. Symantec Backup Exec 12.5 allows companies to save time and cost associated with data...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec