Symantec

Displaying 1-40 of 152 results

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Jan 2012

    Orange Business Services Gets Green Light to Highly Available Services

    In this webcast, the presenter explains about Symantec data storage. The presenter also explains about solution, opens door to highly available, reliable virtualization and cloud computing strategy which is provided by integrated Symantec data storage.

    Provided By Symantec

  • Webcasts // Jan 2012

    VimpelCom Success: Data Center

    In this webcast, the presenter explains about Symantec storage management, data protection, and high availability and tells about the solutions to drive down capital and operating costs while delivering optimal services to 181-plus customers in Europe, Asia, and Africa.

    Provided By Symantec

  • Webcasts // Jan 2012

    LPI Integration & Symantec Endpoint Protection 12: Partner Thoughts

    In this webcast, the presenters explain about Symantec and its benefits. The presenters also discuss the benefits of standardizing on Symantec Endpoint Protection 12 and the value of holding the SMB Specialization.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Virtualize With Confidence in Hyper-V Environments

    In this webcast, the presenter discusses advantages for Hyper-V environments gained from Live Storage Migration and Wide Area Disaster Recovery features in Veritas Storage Foundation and High Availability for Windows 6.0.

    Provided By Symantec

  • Webcasts // Jan 2012

    Improve Service Levels and Reduce Cost With Storage Foundation Manager

    In this webcast, the presenter discusses why Storage Foundation Manager is a must have for Data Center Environments running Storage Foundation and High Availability software to dramatically improve service levels while reducing cost.

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability for Linux

    In this webcast, the presenter explains about how standardization and a single, powerful set of tools that span operating systems and storage infrastructures can provide a foundation for standardized backup, disaster recovery and other data management and protection services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability Products on Solaris

    In this webcast, the presenter explains about using Veritas Storage Foundation and high availability products in a Solaris environment, including the importance of standardization, moving to clustered file systems, and workload performance.

    Provided By Symantec

  • Webcasts // Jan 2012

    High Availability With Veritas Cluster File System - Part 1

    In this webcast, the presenter explains what a clustered file system. The presenter also explains about the clustered file systems can be dramatically shorten application of failover and improve availability.

    Provided By Symantec

  • Webcasts // Jan 2012

    A 40% Faster Backup and 40% Lower Storage Volumes With Symantec

    In this webcast, the presenter explains about Symantec Backup Exec 2012 and its benefits. The presenter explains his benefits which is accelerated backup by 40% and reduced the volume of stored data by the same amount.

    Provided By Symantec

  • Webcasts // Jan 2012

    Continental Technologies (CTI): Security and Data Protection

    In this webcast, the presenters share their facing challenges about security. The presenters also explain how works the security and storage solutions which is provided by Symantec and to help their customers with their IT needs.

    Provided By Symantec

  • Webcasts // Jan 2012

    Secure Cloud Computing - Symantec O3

    In this webcast, the presenter explains about Symantec O3. The Symantec O3 is a cloud information protection platform that provides context-based access control, information security and information management as a service for cloud applications and services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Email Spam Filter & Virus Protection Solution - Symantec.cloud

    In this webcast, the presenter asks how to keep one business safe? The presenter tells about Symantec.cloud Email Security services and its protect against email spam, viruses, phishing and other email threats via the cloud.

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • Webcasts // Jan 2012

    Symantec Data Loss Prevention for Mobile

    In this webcast, the presenter shares his enterprises need to protect confidential data wherever it resides - even on tablet computers like the iPad. The presenter also the uses of Symantec Data Loss Prevention for Mobile.

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • Webcasts // Apr 2011

    Defeating the Cyber Mutants: Protecting Your Business from Modern Malware

    Modern malware rarely strikes the same way twice. Today's malicious code rapidly mutates, bypassing traditional defences. This webcast will examine these threats and the new technology that organizations from small businesses to large enterprises can use to protect their physical and virtual environments. Attend this webcast to learn: Why traditional...

    Provided By Symantec

  • Webcasts // Mar 2011

    Symantec Study: SMBs Not Prepared For Disasters, Don't Act Until It's Too Late

    Symantec's 2011 SMB Disaster Preparedness Survey found that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also revealed that disaster-related downtime costs a typical SMB $12,500 per day. Learn more about the survey findings...

    Provided By Symantec

  • Webcasts // Feb 2011

    Small Businesses: Protect Your Sensitive Information from the Latest Security Threats

    FFind out about the latest attack toolkits and other threats that can compromise your small business data. Attendees will be able to walk away from the webcast with a greater sense of the small business security landscape, and what they can do to protect their proprietary information, including financial and...

    Provided By Symantec

  • Webcasts // Jan 2011

    Norton Secured Seal Powered by VeriSign: Partner Thoughts

    In this webcast, the presenter explains about Verisign. The presenter also discusses about the transition of VeriSign SSL (Secure Sockets Layer) to Norton Secured Seal Powered by VeriSign. The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission over the Internet.

    Provided By Symantec

  • Webcasts // Nov 2010

    Webcast: Smart Route to Windows 7

    Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process. During this 30 minute...

    Provided By Symantec

  • Webcasts // Mar 2010

    Moving Your IT Into the Cloud: Guidance and Options

    This webcast provides business and IT leaders with advice and options for planning and implementing a cloud solution to improve their business processes, enable business innovation, and improve the effectiveness of their workforce. The attendee will learn about the benefits of cloud computing, choosing the right cloud solution, best practices,...

    Provided By Symantec

  • Webcasts // Jan 2010

    Announcing Backup Exec 2010: Protect More, Store Less, Save More

    If one is like most growing companies, one is facing an increased challenge to backup all the data while keeping storage costs under control. Would one like to improve the backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Hydraq Attack Update - Ensure Your Organization Is Secure

    Hydraq (aka "Aurora") is the latest high profile security incident to hit the news. Hydraq is a targeted attack that is also currently referred to as Aurora, Google Attacks, and the Microsoft IE Vulnerability. Through the exploitation of a vulnerability, it attempts to install a trojan on a specific computer...

    Provided By Symantec

  • Webcasts // Jan 2010

    Get Leaner and More Resilient With the New Storage Foundation and Veritas Cluster Server 5.1 Release

    The attendee of this webcast learns about the recent 5.1 launch of Veritas Storage Foundation, Veritas Cluster File System and Veritas Cluster Server, Symantec's industry-leading heterogeneous storage management and high availability solutions. This webcast will cover new capabilities that will help the attendee optimize storage resources and reduce downtime: Considering...

    Provided By Symantec

  • Webcasts // Jan 2010

    Addressing the Root Causes of Inefficiency in Data

    Creating efficiency is a top concern for IT organizations - especially for mid-sized businesses that may be resource-constrained. In the wake of a tough 2009 economy and unprecedented data growth, IT organizations are seeking ways to introduce improvements that deliver time and cost savings, and drive higher service levels for...

    Provided By Symantec

  • Webcasts // Jan 2010

    Cut Storage Costs in Your Virtual World

    There's little question that virtualization is the single biggest game-changing trend in IT today. But virtualization can make information management more complex as well as increase storage consumption and costs. What can prevent one from fully realizing the promise of virtualization lies in poorly utilized or managed storage and an...

    Provided By Symantec

  • Webcasts // Jan 2010

    Protect More, Store Less by Upgrading to Symantec Backup Exec 2010

    If one likes most growing companies, one is facing an increased challenge to backup all their data while keeping storage costs under control. How can one improve the Backup Exec backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec NetBackup 7

    The new release of Symantec NetBackup 7 is redefining best-in-class enterprise data protection with advanced technology features that help customers tackle some of the major information management challenges facing today's enterprise IT environments - from the data center to global and remote offices: uncontrolled backup storage growth.

    Provided By Symantec

  • Webcasts // Jan 2010

    Securing 2010: Perspectives From Industry Security Bloggers

    With trends such as the rise of polymorphic threats, an increase in reputation hijacking and the vast propagation of rogue security software, 2009 made a mark with its fair share of malicious activity. However, new trends in the industry offered encouragement to security administrators as the year came to a...

    Provided By Symantec

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // May 2009

    Competitive Analysis of Performance Impact of Endpoint Security Solutions for Small Businesses

    In small businesses with limited budgets for hardware upgrades, it is important that security software does not significantly impact computer performance. The presenter of this webcast gives the findings of a comprehensive performance comparison which includes 7 vendors, 44 test scenarios, and over 2000 individual test runs. The test concentrated...

    Provided By Symantec

  • Webcasts // May 2009

    Maximize Your Data Protection Infrastructure

    The attendee of this webcast will get a better understanding on how to maximize the NetBackup data protection infrastructure. Building a robust infrastructure begins with the right architecture and this webcast will provide guidance on this design process and the most important areas of consideration.

    Provided By Symantec

  • Webcasts // May 2009

    What's New in Backup Reporter 6.6: Now With Archive Reporting and Even More Enhanced Backup Reporting

    Backup Reporter 6.6 new features and enhancements will be showcased. The premier new feature is that it is now capable of reporting on Symantec's industry leading archiving solution, Enterprise Vault. The same business-level trending and analysis can be applied to archive reporting as well as its already superb backup reporting....

    Provided By Symantec

  • Webcasts // May 2009

    From Endpoint to Gateway: Effectively Secure Your Environment With the New Symantec Protection Suite Enterprise Edition

    How compete is the environment protected from today's complex malware, data loss, and spam threats? In the event of user error, hardware failure, or malicious action can one rapidly recover desktops and laptops so the users can remain productive? The presenter of this webcast discuss Symantec's newest security suite, Symantec...

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • Webcasts // Apr 2009

    Stop Buying Storage - Part 3: Controlling Email and File Server Growth and Costs With Intelligent Archiving

    Sometimes feel overwhelmed with what feels like a continuous barrage of information growth? According to IDC 54% of the storage capacity added by organizations in 2008 will be dedicated to the storage of file-based data and projected grow to 75% by 2011. The presenter of this webcast will discuss how...

    Provided By Symantec

  • Webcasts // Jun 2009

    Increase Server Availability by Automating Problem Resolution Using Altiris Server Management Suite From Symantec

    Increasing server availability and uptime is a chief concern for server administrators. However, proactively detecting issues that affect server availability is often an inconsistent and manual process. The attendee will learn how to regularly monitor the critical server processes using Altiris Server Management Suite's Monitor Solution to detect issues early...

    Provided By Symantec

  • Webcasts // Jun 2009

    Faster Recovery With Symantec: Comparative Testing of Data Protection Solutions

    The presenter of this webcast will provide an overview of the test processes, highlight key findings about current solutions in the marketplace, and relate why they are important to any business running Microsoft Exchange and/or VMware environments. The attendee will learn the challenges of protecting Exchange environments, alternatives to protecting...

    Provided By Symantec

  • Webcasts // Jun 2009

    Discover How Mid-Size Organizations Effectively Secure Their Environments With the New Symantec Protection Suite

    How completely is the environment protected from today's complex malware, data loss, and spam threats? The presenter of this webcast discusses challenges faced by mid-sized organizations and how Symantec's newest security suite, Symantec Protection Suite Enterprise Edition, can help one address those challenges. Symantec Protection Suite Enterprise Edition creates a...

    Provided By Symantec

  • Webcasts // Jun 2009

    How and Why You Need to Protect Your Small Business

    How completely is small business environment protected from today's complex malware, data loss and spam threats? How can one have confidence that the assets are continuously protected while focusing on running the business? Symantec Protection Suite Small Business Edition is an easy to use, "All-in-one" suite that protects critical business...

    Provided By Symantec

  • Webcasts // Apr 2009

    Symantec Internet Security Threat Report Volume XIV - Key Facts and Figures

    The Internet threat landscape continues to challenge the organization's information with increasingly complex and sophisticated attacks. This is making it even more important to have access to global threat intelligence that can assist in making informed decision on how best to protect the company's assets. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Apr 2009

    Containing Vendor Sprawl: Improve Security, Reduce Risk & Lower Costs

    The presenter of this webcast will explain the cost of managing multiple vendors across disparate products and outline the benefits of consolidating security, storage, and systems management solutions with one strategic vendor. The attendee of this webcast will learn about top security challenges in the next 12 months and how...

    Provided By Symantec

  • Webcasts // Jun 2009

    Backup Is for Recovery, Archiving Is for Discovery: Legal and IT Considerations of Each

    The presenters of this webcast discuss the changing role of backup technology in the enterprise. The presenters discuss four key elements of backup and archiving: Backup is for Recovery, Archiving is for Discovery, Accessible or Inaccessible, Backup and Archive Retention Policies and Archiving and Backup.

    Provided By Symantec

  • Webcasts // May 2009

    Data Protection and Compliance: Improve Security, Manage Risk & Lower Costs

    Information has become the single most important asset to an organization's success, whether it's customer information, confidential corporate information, or financial information. Ensuring that information assets remain secure and readily available to remote employees, customers, and partners is critical to a high performance organization. The attendee will gain an understanding...

    Provided By Symantec

  • Webcasts // May 2009

    Backup and Recover Your Microsoft Hyper-V Environment in Seconds

    Planning to implement Microsoft Hyper-V to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several infrastructure changes that must be addressed. One change must consider is how to implement a reliable backup and recovery solution to protect critical data...

    Provided By Symantec

  • Webcasts // Jun 2009

    Symantec Workflow and Security Responses

    One of the employees looses a laptop or "Accidentally" copies critical data to a USB drive before they leave the building. Perhaps there is a virus outbreak and one needs to get the critical patch out to the endpoints. What is the process for responding to these security threats and...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Webcasts // Jun 2008

    Symantec Endpoint Protection 11.0 - Benefits of Upgrading

    This webcast will present the benefits of upgrading to Symantec Endpoint Protection 11.0. Symantec Endpoint Protection threat prevention technologies present users with the optimum balance between security needs, administrative overhead and system impact. The webcast will focus on the advantages of the Symantec Endpoint Protection 11.0 management architecture, the required...

    Provided By Symantec

  • Webcasts // Mar 2009

    What's New in Altiris Server Management Suite 7.0

    With the launch of Altiris Server Management Suite 7.0, Symantec supplies the essentials for server management. The attendee will learn about the new and exciting features for servers from the new approach to server monitoring and enhanced proven technologies in server inventory to device discovery, server provisioning, and software and...

    Provided By Symantec

  • Webcasts // Mar 2009

    NEW Backup Exec Infrastructure Manager 12.5 - Managing Your Backup Exec Environment With Ease

    The presenter of this webcast gives a technical overview and demonstration of the NEW Backup Exec Infrastructure Manager 12.5, the latest addition to the Backup Exec family. Backup Exec Infrastructure Manager (powered by Altiris technology) delivers great benefits, simplifying the automation, deployment, and updating, upgrades, and licenses management of Backup...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Mar 2009

    Legacy Database Archiving With Symantec Enterprise Vault and Applimation

    Archiving has manifested itself to become a significant component in any organization's plan to better manage the growth of unstructured data - now what about structured data? With Applimation, customers can now archive from Oracle, SAP, and Peoplesoft applications directly into their central Enterprise Vault repository.

    Provided By Symantec

  • Webcasts // Jan 2009

    Symantec Log Management Service: Capture Log Files, Respond to Threats and Address Growing Compliance Demands

    IT risk and compliance demands are heightening the need for a security approach that delivers comprehensive security monitoring and real-time incident alerting that expands support beyond networks to include critical servers, applications and end points, compliance reporting that eases administrative burdens and can accommodate custom reporting needs and flexible archive...

    Provided By Symantec

  • Webcasts // Sep 2008

    Learn How Symantec Business Critical Services (BCS) Can Minimize Downtime and Ensure You Receive Maximum Value From Your Symantec Investment

    The attendee of this webcast will learn more about how Business Critical Services was designed for enterprises such as that have minimal tolerance for service interruptions. The attendee will also learn about the range of options available; from the highest levels of responsiveness to personalized and proactive services that are...

    Provided By Symantec

  • Webcasts // Jul 2008

    IT Analytics for Symantec Endpoint Protection - Uncover New Ways to More Effectively Manage and Secure Your Environment

    The attendee will learn how the new IT Analytics Symantec Endpoint Protection Pack will provide enhanced visibility into the health of the environment, allowing to make strategic decisions to combat potential security threats. The IT Analytics Symantec Endpoint Protection Pack is an advanced reporting solution that leverages business intelligence capabilities...

    Provided By Symantec

  • Webcasts // Feb 2009

    Top 7 Backup Mistakes to Avoid in Windows Environment

    There are several common backup/restore mistakes that could be costing the money and even putting the business data at risk. The attendee will learn how Backup Exec for Windows 12.5 and Backup Exec System Recovery 8.5 can help to avoid these common backup mistakes in Windows environments.

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jul 2009

    The Economics of Green IT: Start Saving Money

    CIOs pay millions of dollars a year to power and cool data centers. Many enterprises, some for the first time this year, have shifted the energy bill from facilities to IT, with the hope - and expectation - that IT can lower energy costs. In addition, many enterprises seek to...

    Provided By Symantec

  • Webcasts // Jul 2009

    Put Data Storage on a Diet With Symantec Deduplication

    If there's one absolute in business, it's that data will continue to grow. Organizations of all sizes around the world wrestle with an ever-growing array of information management headaches, storage concerns and recovery needs. And increasingly, organizations are turning to data deduplication to address these issues. But how one will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • Webcasts // Aug 2009

    How Does the State of Spam Affect Your Small Business?

    Spammers use popular events to cover their tracks?. The recent death of Michael Jackson and its subsequent public interest show that spammers are willing to use any notable event as a cover to distribute their messages. Symantec State of Spam report shows that 90 percent of all email coming into...

    Provided By Symantec

  • Webcasts // Aug 2009

    It's Not What You Know, It's Who You Know. Not All Security Vendors Are Created Equal

    Driven by the rising tide of organized cyber-crime and the increased sophistication of hackers, targeted attacks are increasingly aimed at stealing the confidential information. For every business, the ability to recognize and respond to threats rapidly has never been more critical. As TBR's Security Infrastructure Benchmark study reveals, not all...

    Provided By Symantec

  • Webcasts // Aug 2009

    Respond to Threats Rapidly

    The threat landscape is evolving dynamically. Today's attacks are more targeted and malicious than ever before. Here's what one can do to respond to these attacks and ensure the organization is protected. Symantec is the worldwide leader in comprehensive endpoint protection. In 2008, Symantec responded to an average of more...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don~t Gamble With Your Recovery: Ensure Application Recovery (Part 2 of 4)

    Over the next year, IT budgets will remain essentially flat. However, as organizations increasingly rely on IT, the requirements for higher service levels are growing as well. Symantec offers high availability and disaster recovery solutions that keep these mission critical applications up and running - while also helping to find...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Three IT Strategies to Keep Your Business in the Game (Part 1 of 4)

    Building out an overall recovery strategy can't just be a roll of the dice. It's no longer enough to have an "In case of emergency" disaster recovery plan that just sits on the shelf. Now there is also need to address the "small disasters" that typically impact daily business operations...

    Provided By Symantec

  • Webcasts // Aug 2009

    Achieve "Proactive Compliance" Through Automation

    The presenter of this webcast examines how the organization can achieve "Proactive compliance" by standardizing on IT controls and automating the compliance process. Leveraging a Capability Maturity Model as a framework, the presenter will discuss solutions which can be deployed to help to reach this goal. The presenter will also...

    Provided By Symantec