Symantec

Displaying 1-40 of 365 results

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Sponsored By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Requirement for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • Case Studies // Sep 2014

    A Tale of Two Malware Attacks: One Blocked and One Brutal

    How bad can it get when malware protection fails? And what can you do about it? CBS Interactive and Symantec are proud to present "A tale of two malware attacks: one blocked and one brutal," a cautionary tale that explores what goes wrong when users in small and medium-sized business...

    Provided By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Requirement for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // May 2009

    Enterprise Vault 8.0: File System Archiving

    Enterprise Vault surpasses the scope, ability and performance of typical file management applications which merely move data based on broad policies from one storage device to another. As files are now routinely being requested for internal and external investigations, Enterprise Vault File System Archiving enables the organizations to meet their...

    Provided By Symantec

  • White Papers // May 2009

    VERITAS Storage Foundation Cluster File System 5.0 From Symantec: Using CFS for Oracle Fast Failover

    Symantec Cluster File System provides an efficient solution for fast failover of Oracle databases without incurring the cost and complexity of a Oracle RAC environment. It provides downtime SLAs within acceptable limits for most applications. The fundamental properties of CFS including access to shared file systems by applications running on...

    Provided By Symantec

  • White Papers // Mar 2009

    Creating a Sustainable Infrastructure

    Compliance projects can bury organization in process and paperwork. Creating a sustainable compliance operation starts with using risk management to prioritize and continues with understanding how to leverage new technology in security, storage and networking infrastructure to create a true compliance infrastructure. The tools needed to become compliant are a...

    Provided By Symantec

  • White Papers // Mar 2009

    Risk, Readiness and Redundancy: PCI Compliance Automation With Symantec Control Compliance Suite

    For most of this decade, the major credit card companies have been aggressively developing standards to establish a common approach to protect the privacy and security of sensitive credit card data. In June 2001, Visa mandated the Cardholder Information Security Program (CISP) for merchants and financial institutions handling its card...

    Provided By Symantec

  • White Papers // May 2009

    Essential Server Management for Mid-Sized Organizations: A Strategy for overcoming Challenges in Today's Complex and Costly IT Environments

    The task of server management is more costly and complex than ever. At the same time, there have never been greater expectations for IT departments to deliver business value to the organizations they serve. Altiris Server Management Suite from Symantec provides essential server management that enables IT administrators to focus...

    Provided By Symantec

  • White Papers // Apr 2009

    The 12 Business Benefits of Workspace Virtualization: For Cash-Strapped Financial Institutions, Bottom-Line Cost Savings Come With Added Manageability and Security Perks

    Workspace or endpoint virtualization is a centrally-controlled computing model for which applications are served up to individual desktops. "It offers an 'implement once, deploy many' approach to winning control over one of the most onerous security challenges in business? Institutions benefit from configuration and change control that directly addresses the...

    Provided By Symantec

  • White Papers // Apr 2009

    Veritas CommandCentral - Supporting the Virtual Enterprise

    Veritas CommandCentral is an enterprise storage management solution that provides the ability to manage storage effectively not only in the physical environment, but in the virtual environment as well. As organizations evaluate different physical and virtual solutions, it is imperative to consider the management implications of server and storage virtualization....

    Provided By Symantec

  • White Papers // Jul 2009

    Backup for VMware ESX Environments With Veritas NetBackup PureDisk From Symantec

    Traditional backup solutions are able to back up virtual guests on a VMware ESX host; however, the resource utilization on the host and the backup time required quickly become areas of concern. The NetBackup PureDisk client running in a virtual guest provides excellent deduplication at the source and can back...

    Provided By Symantec

  • Webcasts // Aug 2009

    How Does the State of Spam Affect Your Small Business?

    Spammers use popular events to cover their tracks?. The recent death of Michael Jackson and its subsequent public interest show that spammers are willing to use any notable event as a cover to distribute their messages. Symantec State of Spam report shows that 90 percent of all email coming into...

    Provided By Symantec

  • Webcasts // Aug 2009

    It's Not What You Know, It's Who You Know. Not All Security Vendors Are Created Equal

    Driven by the rising tide of organized cyber-crime and the increased sophistication of hackers, targeted attacks are increasingly aimed at stealing the confidential information. For every business, the ability to recognize and respond to threats rapidly has never been more critical. As TBR's Security Infrastructure Benchmark study reveals, not all...

    Provided By Symantec

  • Webcasts // Aug 2009

    Respond to Threats Rapidly

    The threat landscape is evolving dynamically. Today's attacks are more targeted and malicious than ever before. Here's what one can do to respond to these attacks and ensure the organization is protected. Symantec is the worldwide leader in comprehensive endpoint protection. In 2008, Symantec responded to an average of more...

    Provided By Symantec

  • White Papers // Apr 2009

    Five Critical Recovery Flaws Your Last Disaster Recovery Test Missed

    Businesses today are spending millions of dollars to develop and maintain Disaster Recovery (DR) infrastructures that will ensure business continuity. But despite such huge investments of time and resources, most IT professionals are still not completely confident in their ability to recover in an emergency. This paper examines how automated...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • White Papers // Jul 2009

    Containing an Outbreak: How to Clean Your Network After an Incident

    It's not the sort of statement want to hear in regards to network. Whether a network admin plans a containment strategy or an executive assessing the damage done, one knows that such situations cost time and money to resolve. Determining where to start can be equally as frustrating, especially when...

    Provided By Symantec

  • White Papers // May 2009

    Enhancing Microsoft SQL Server 2005 Availability With Veritas Storage Foundation for Windows

    Veritas Storage Foundation HA for Windows from Symantec is designed to support the Standard Edition and the Enterprise Edition of SQL Server; all versions of the Microsoft Windows 2003 Server and Windows Server 2008 operating systems, including both 32-bit and 64-bit versions; and VMware and Microsoft Virtual Server environments. SQL...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • White Papers // Apr 2009

    Enterprise Vault 8.0: Technical Overview

    Unstructured content like email and files are a huge management problem for companies of all sizes. The growth of this information in the form of email and files on storage devices and frontline servers are causing headaches as companies attempt to manage IT risk but maximize performance. This whitepaper has...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 1 - Solution Overview

    This whitepaper provides a high-level overview of the PST problem, the issues with PST migration, and how the PST migration tools available in Enterprise Vault can solve them. PST files (also known as Personal Folders or Outlook data files) were not designed to handle the rigorous demands of today's large-scale...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 3 - Planning, Tech Tips & Best Practice

    This whitepaper looks at some important aspects of a PST migration project; namely, planning and best practice usage of the tools in different migration scenarios. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. One of the key decisions when planning PST migration is choosing the...

    Provided By Symantec

  • White Papers // Apr 2009

    PST Migration With Enterprise Vault 8.0: Part 2 - The Tools in Depth

    This whitepaper looks at the various Enterprise Vault tools in detail, including how each of them use settings from PST migration and Mailbox policies, and how each tool works. The whitepaper is intended primarily for Symantec and partner System Engineers and Consultants. Migrating PST files using the PST Migration Wizard...

    Provided By Symantec