Symantec

Displaying 1-40 of 327 results

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

    Sponsored By Symantec

  • eBooks // Apr 2015

    Internet Security Threat Report 2015 - eGuide

    This annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant...

    Sponsored By Symantec

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Infographic Path of a Cyberattacker

    2014 has been a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years. This report looks from the attacker's perspective to understand the path of their attacks. Download this report to learn more.

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // Mar 2015

    The Cyber-Resilient Enterprise - Harnessing Your Security Intelligence

    An important shift has occurred in the security landscape of late. To keep pace in an ever more competitive world, businesses are adopting new ways of doing business, making them more dependent than ever on connected services and exposing them to new security challenges This paper details to IT leadership...

    Sponsored By Symantec

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Provided By Symantec

  • White Papers // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

    Provided By Symantec

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Provided By Symantec

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Provided By Symantec

  • Tools & Templates // Jan 2015

    Stay Ahead of Targeted Cyber Attacks - Symantec TAP Security Assessment

    Targeted attacks are no longer striking large businesses only. In 2013, small and medium businesses were victims of 61 percent of all targeted attacks, up from 50 percent in 2012. As targeted attacks are on the rise, Symantec is providing a free Targeted Attack Protection (TAP) Assessment Tool which will...

    Provided By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Provided By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Provided By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Provided By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Provided By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Provided By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Provided By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Provided By Symantec

  • Case Studies // Sep 2014

    A Tale of Two Malware Attacks: One Blocked and One Brutal

    How bad can it get when malware protection fails? And what can you do about it? CBS Interactive and Symantec are proud to present "A tale of two malware attacks: one blocked and one brutal," a cautionary tale that explores what goes wrong when users in small and medium-sized business...

    Provided By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Requirement for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // Mar 2015

    The Cyber-Resilient Enterprise - Harnessing Your Security Intelligence

    An important shift has occurred in the security landscape of late. To keep pace in an ever more competitive world, businesses are adopting new ways of doing business, making them more dependent than ever on connected services and exposing them to new security challenges This paper details to IT leadership...

    Sponsored By Symantec

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Sponsored By Symantec

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Key Findings

    If there is one thing that can be said about the threat landscape, and cyber security as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code...

    Sponsored By Symantec

  • eBooks // Apr 2015

    Internet Security Threat Report 2015 - eGuide

    This annual Symantec Internet Security Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future. If there is one thing that can be said about the threat landscape, and Internet security as a whole, it is that the only constant...

    Sponsored By Symantec

  • White Papers // Apr 2015

    Internet Security Threat Report 2015 - Infographic Path of a Cyberattacker

    2014 has been a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years. This report looks from the attacker's perspective to understand the path of their attacks. Download this report to learn more.

    Sponsored By Symantec

  • Resource Center // Jan 2009

    Symantec Backup Exec Challenge

    Symantec invites you to take the Backup Exec? Challenge. Answer six questions to receive an analysis of how your current backup solution compares to Symantec Backup Exec 12.5 and Symantec Backup Exec System Recovery 8.5.

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • Webcasts // May 2007

    VCS for VMware ESX: The Only Comprehensive HA/DR Solution for the VMware Environment

    Companies have achieved higher utilization and lower hardware costs through server virtualization and consolidation. However, placing multiple applications on one server increases the impact of a human, software, or machine error. Where hardware failure may have impacted a single application, with virtualization, many applications may be affected. To mitigate this...

    Provided By Symantec

  • White Papers // May 2007

    Symantec Enterprise Vault: File System Archiving

    For more than 25 years, organizations have been attracted to the idea of providing different storage layers according to the relevance of data, an approach referred to as Hierarchical Storage Management (HSM). Today, however, companies accumulate an enormous amount of information, presenting new challenges. In addition to simply storing the...

    Provided By Symantec

  • White Papers // Nov 2007

    Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies

    Veritas NetBackup 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage...

    Provided By Symantec

  • Downloads // Jun 2008

    Symantec Backup Exec System Recovery Server Edition

    Symantec Backup Exec System Recovery 8 restores systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. Backup Exec System Recovery 8 now includes: flexible offsite protection to an FTP location or secondary disk; granular recovery of Microsoft Exchange and SharePoint documents or files and...

    Provided By Symantec

  • Webcasts // Jun 2008

    Symantec Endpoint Protection 11.0 - Benefits of Upgrading

    This webcast will present the benefits of upgrading to Symantec Endpoint Protection 11.0. Symantec Endpoint Protection threat prevention technologies present users with the optimum balance between security needs, administrative overhead and system impact. The webcast will focus on the advantages of the Symantec Endpoint Protection 11.0 management architecture, the required...

    Provided By Symantec

  • White Papers // Aug 2009

    Medicaid MITA: Innovative COTS Solutions for IT Risk Management

    This paper provides an overview of the MITA Technical Architecture and discusses key areas of potential contribution to implementation of this framework from one the world's leading IT security and infrastructures software solution providers, Symantec. The goal of this paper is to facilitate discussion and familiarization of the Symantec Commercial...

    Provided By Symantec

  • Webcasts // Sep 2009

    Dedupe - How to Be a Hero With NetBackup

    Do More With Less - how many times has management tasked to do that? Well with the NetBackup Platform one really can. With the data deduplication capabilities of NetBackup PureDisk one can protect more and store less - up to 8x more than other deduplication products on comparable server hardware....

    Provided By Symantec

  • Webcasts // Sep 2009

    Prevent Security Breaches by Protecting Information Proactively

    Which organizations want to be in the news because of a security breach? Threats to corporate information continue to increase and IT organizations now have to worry about internal and external attack vectors - including employees who may either intentionally or accidentally risk critical information. Loss of this critical information...

    Provided By Symantec

  • Webcasts // Sep 2009

    Manage and Secure Your Mobile Devices Efficiently

    The attendee of this webcast will learn how Symantec makes it easy to manage and secure mobile devices efficiently. A priority for IT organizations is to efficiently secure all their endpoints and gain confidence that corporate assets and business operations are protected and updated - all while controlling costs. After...

    Provided By Symantec

  • Webcasts // Sep 2009

    Reduce Costs With Good Systems Management Practices in Hard Economic Times

    As budgets are being slashed, IT is still expected to do more with less to support the business. With good systems management practices in place using products from Symantec such as Altiris Client Management Suite, IT professionals can reduce overall costs of owning PCs throughout their organization. This webcast will...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • Webcasts // Aug 2009

    Automating Server Management Processes With Workflow

    This webcast will discuss the benefits of automation, or workflow, within an IT department to help reduce the time that administrators spend on mundane, repetitive and manual tasks. The webcast will highlight the Altiris Workflow Solution and give several real-world examples of how server focused IT processes can be automated...

    Provided By Symantec

  • Webcasts // Aug 2009

    How Does the State of Spam Affect Your Small Business?

    Spammers use popular events to cover their tracks?. The recent death of Michael Jackson and its subsequent public interest show that spammers are willing to use any notable event as a cover to distribute their messages. Symantec State of Spam report shows that 90 percent of all email coming into...

    Provided By Symantec

  • Webcasts // Aug 2009

    It's Not What You Know, It's Who You Know. Not All Security Vendors Are Created Equal

    Driven by the rising tide of organized cyber-crime and the increased sophistication of hackers, targeted attacks are increasingly aimed at stealing the confidential information. For every business, the ability to recognize and respond to threats rapidly has never been more critical. As TBR's Security Infrastructure Benchmark study reveals, not all...

    Provided By Symantec

  • Webcasts // Aug 2009

    Respond to Threats Rapidly

    The threat landscape is evolving dynamically. Today's attacks are more targeted and malicious than ever before. Here's what one can do to respond to these attacks and ensure the organization is protected. Symantec is the worldwide leader in comprehensive endpoint protection. In 2008, Symantec responded to an average of more...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don~t Gamble With Your Recovery: Ensure Application Recovery (Part 2 of 4)

    Over the next year, IT budgets will remain essentially flat. However, as organizations increasingly rely on IT, the requirements for higher service levels are growing as well. Symantec offers high availability and disaster recovery solutions that keep these mission critical applications up and running - while also helping to find...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Three IT Strategies to Keep Your Business in the Game (Part 1 of 4)

    Building out an overall recovery strategy can't just be a roll of the dice. It's no longer enough to have an "In case of emergency" disaster recovery plan that just sits on the shelf. Now there is also need to address the "small disasters" that typically impact daily business operations...

    Provided By Symantec

  • Webcasts // Aug 2009

    Achieve "Proactive Compliance" Through Automation

    The presenter of this webcast examines how the organization can achieve "Proactive compliance" by standardizing on IT controls and automating the compliance process. Leveraging a Capability Maturity Model as a framework, the presenter will discuss solutions which can be deployed to help to reach this goal. The presenter will also...

    Provided By Symantec

  • Webcasts // Aug 2009

    Expand Your Data Recovery Capabilities With Complete System Protection

    Organizations around the world trust market leading Symantec Backup Exec technology to protect business critical applications and data, but how to backup and recover entire servers or desktops in the event of a failure or disaster? The attendee of this webcast will discover how Backup Exec System Recovery complements and...

    Provided By Symantec

  • Webcasts // Aug 2009

    Introducing Symantec Workflow 7.0

    Effective process is the life blood of business. But inefficient, inflexible, and manual processes can inhibit the flow of business and affect the bottom line. The presenters of this webcast shows the latest innovations introduced with Symantec Workflow 7.0 that help as an IT professional automate IT and business processes...

    Provided By Symantec

  • Webcasts // Jul 2009

    Using Best Practices to Comply With NERC Cyber Security Compliance

    Electric power companies face increasing regulatory requirements, including NERC CIP, Sarbanes Oxley and others. To maintain these regulations can be costly and time-consuming. Moreover, 2009 is a critical year for energy and utility companies as The North American Electric Reliability Corporation (NERC) regulations require that utilities be "compliant" by July...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure and Manage the Endpoint With Altiris Client Management Suite

    90% of incidents would not have happened if the endpoints simple had the appropriate patch installed? Good systems management is key to protecting the systems from vulnerabilities. The attendee will learn how to configure and protect the endpoint using Altiris Client Management Suite. This industry-leading product will help as an...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec