Symantec

Displaying 1-40 of 417 results

  • White Papers // Dec 2014

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Sponsored By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Sponsored By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • Case Studies // Sep 2014

    A Tale of Two Malware Attacks: One Blocked and One Brutal

    How bad can it get when malware protection fails? And what can you do about it? CBS Interactive and Symantec are proud to present "A tale of two malware attacks: one blocked and one brutal," a cautionary tale that explores what goes wrong when users in small and medium-sized business...

    Provided By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Provided By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Provided By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Sponsored By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Sponsored By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Sponsored By Symantec

  • Presentations // Nov 2014

    5 Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Dec 2014

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • Case Studies // Mar 2010

    Cholet Town Hall Gains a Secure Information System With Symantec

    With an information system linking 40 sites across the region, a broad diversity of access points, and nearly 100 third-party applications, Cholet Town Hall was faced with a complex problem when it came to endpoint security. The French local authority therefore implemented a global solution combining Symantec Endpoint Protection, Symantec...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • Webcasts // Oct 2009

    Simplify, Automate, and Reduce the Cost of IT Asset Disposal With TechTurn's Retirement Solution

    The attendee of this webcast will learn about a new free plug-in for the Symantec Management Console called TechTurn Retirement Solution. TechTurn Retirement Solution extends the power of the Altiris management software by automating the often ignored "Last mile" in an asset's life. Now one can use the Symantec Management...

    Provided By Symantec

  • Webcasts // Jan 2009

    Security Operations Management - Improved Protection Against Today's Security Threats

    Security operations management is increasingly challenging for corporations due to increasing threats, multiple technologies, difficulties in attracting, training and retaining skilled staff, expanding regulatory scopes, and budget constraints. Many organizations have technology and services that provide insight into malicious activity, however, they often lack an effective framework for responding to...

    Provided By Symantec

  • Webcasts // Oct 2009

    To Green or Not to Green. That Is the Question

    Green IT impacts costs, compliance, and customer perceptions, making it a top business priority for Executives across the world. The attendee will learn how the Renault F1 Team has successfully implemented Green IT initiatives, what they learned in the process, and what they are doing today to continue being green....

    Provided By Symantec

  • Webcasts // Oct 2009

    Symantec FileStore: Building a Foundation for Cloud Storage

    Cloud storage has the potential to change the economic cost curve for computer storage delivery. Lower product costs and reduced administrative effort make Cloud Storage attractive for both public cloud providers and enterprises considering a private cloud. Symantec FileStore delivers the benefits of Cloud, starting with a bridge from current...

    Provided By Symantec

  • Webcasts // Oct 2009

    Announcing the Backup Exec 2010 Early Adopter Program - Dedupe Everywhere!

    Interested in learning more about the benefits of data deduplication? The next major release of Backup Exec coming later this year brings industry recognized deduplication technology (using NetBackup PureDisk technology). The attendee of this webcast will learn how to enroll in the upcoming early adopter program and the data reduction...

    Provided By Symantec

  • Webcasts // Oct 2009

    High Availability and Disaster Recovery for Virtual Server Environments

    Companies are utilizing server virtualization to reduce hardware costs and increase agility, however deploying mission-critical applications in virtual machines brings new challenges. The attendee will gain a deeper understanding of the challenges to true high availability and some answers on how to achieve it.

    Provided By Symantec

  • White Papers // May 2007

    Symantec Enterprise Vault: File System Archiving

    For more than 25 years, organizations have been attracted to the idea of providing different storage layers according to the relevance of data, an approach referred to as Hierarchical Storage Management (HSM). Today, however, companies accumulate an enormous amount of information, presenting new challenges. In addition to simply storing the...

    Provided By Symantec

  • Webcasts // Oct 2009

    Archiving and Information Management for Microsoft Exchange 2010

    As organizations eagerly anticipate the release of Microsoft Exchange 2010, experts from Symantec and Microsoft come together to discuss Exchange 2010 and key considerations for archiving Exchange and other Microsoft applications. Attend this webcast to learn how to make job easier around managing Exchange, storage, and E-Discovery matters.

    Provided By Symantec

  • Webcasts // May 2009

    Backup and Recover Your Microsoft Hyper-V Environment in Seconds

    Planning to implement Microsoft Hyper-V to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several infrastructure changes that must be addressed. One change must consider is how to implement a reliable backup and recovery solution to protect critical data...

    Provided By Symantec

  • Webcasts // Nov 2009

    Windows Virtualization - Crossing the Data Protection Divide With NetBackup

    As more companies move to virtualization to control spiraling IT costs, virtual machines are taking on more mission-critical workloads as Microsoft Exchange, SQL, SharePoint, and Active Directory. Protecting such application, data, and storage-intensive environments takes on a whole new set of complexities, and typically requires a whole new set of...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // May 2009

    Data Protection and Compliance: Improve Security, Manage Risk & Lower Costs

    Information has become the single most important asset to an organization's success, whether it's customer information, confidential corporate information, or financial information. Ensuring that information assets remain secure and readily available to remote employees, customers, and partners is critical to a high performance organization. The attendee will gain an understanding...

    Provided By Symantec

  • Webcasts // Oct 2009

    Why Breaches Happen... and What to Do About It

    For companies with critical information assets such as customer data, intellectual property and proprietary corporate data, the risk of a data breach is now higher than ever before. In order to reduce this risk, it is essential to understand why and how data breaches occur. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Jun 2009

    Backup Is for Recovery, Archiving Is for Discovery: Legal and IT Considerations of Each

    The presenters of this webcast discuss the changing role of backup technology in the enterprise. The presenters discuss four key elements of backup and archiving: Backup is for Recovery, Archiving is for Discovery, Accessible or Inaccessible, Backup and Archive Retention Policies and Archiving and Backup.

    Provided By Symantec

  • Webcasts // Nov 2009

    Five Things You Wish You Knew Before You Virtualized

    The reality of deploying virtualization is that it can also increase the complexity and cost of managing the applications and servers. As Virtual Machines (VMs) proliferate - storage growth, data protection, and application and data recovery are just a few detours that can impact the business' bottom line. Without an...

    Provided By Symantec

  • Webcasts // Nov 2009

    Overview on SP1 Release for Storage Foundation and High Availability for Windows 5.1

    Storage Foundation and High Availability for Windows 5.1 will be releasing Service Pack 1 (SP1) in November. This SP1 release includes an eye-popping list of extended features and additional functionality that enables this product to maintain its competitive edge in the storage management and availability space for the Windows environment....

    Provided By Symantec

  • Webcasts // Nov 2009

    Mind the Gap: What 3rd Party Archiving Brings to Your Exchange Environment

    There are a lot of messages, storage, backups, policies, and people to manage just to maintain the current state of email and make sure it's accessible to those who need it, when they need it. Many organizations need more than the archiving functionality that will be available within Exchange 2010....

    Provided By Symantec

  • Webcasts // Nov 2009

    Get the Most Return From Your Backup Exec Investment

    Anyone on an older version of Backup Exec may be missing out on valuable backup and recovery advantages achieved by simply upgrading. Recent internal performance testing proves that by simply upgrading to the latest version of Backup Exec 12.5, one can experience a 50-100% increase in backup performance. Symantec Backup...

    Provided By Symantec

  • White Papers // Sep 2011

    Internet security in the age of roaming users

    The whole concept of business - how it's done, when it's done, where it's done - is changing radically, and the legions of mobile workers are leading the change. While cloud computing benefits businesses by allowing employees to work remotely, this model also introduces a host of new security risks....

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution: - Think long-term; - Evaluate how easy it is to manage; - Consider how much data you will need to monitor; - Look out for solutions that are scalable and innovative;...

    Provided By Symantec

  • White Papers // Sep 2009

    Symantec NetBackup PureDisk: Optimizing Backups With Deduplication for Remote Offices, Data Center and Virtual Machines

    Modern endeavours find themselves faced with the issue of fast paced growing data. In fact, data growth has been predicted to be in the range of 50-60% per year. But data, instead of being confined to a single centre, is often spread across multiple data centres, remote offices and virtual...

    Provided By Symantec

  • White Papers // Sep 2011

    Email, archiving and productivity

    Is your email system holding back your business? While email has become an indispensible technology, it presents a new set of issues for businesses, from storage demands to increased IT requests to searching difficulties. Companies looking to solve these problems are increasingly looking at hosted email archiving solutions, a centralised...

    Provided By Symantec

  • White Papers // Feb 2009

    Protection You Can Count On

    For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company's bottom line if that data isn't protected. SMBs should...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec