Symantec

Displaying 1-40 of 216 results

  • White Papers // Dec 2014

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Sponsored By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Provided By Symantec

  • White Papers // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

    Provided By Symantec

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jun 2014

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Jun 2014

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Apr 2014

    Modernizing Data Protection With Backup Appliances

    Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • White Papers // Feb 2014

    Gartner 2014 Magic Quadrant for Endpoint Protection Platforms

    Find out which vendors Gartner positions as Leaders, Challengers, Visionaries or Niche Players based on their ability to execute and their completeness of vision. Access a complimentary copy of the Gartner 2014 Magic Quadrant for Endpoint Protection Platforms to: Gain deeper knowledge of the endpoint protection market...

    Provided By Symantec

  • White Papers // Jan 2014

    Datasheet: Symantec NetBackup 5230 Appliance

    Back up in minutes with an integrated backup appliance Speed up recovery and reduce storage cost with Symantec NetBackup 5230 Appliance, which offers deeper visibility into virtual environments. Find out more about achieving swift backup and recovery with an all-in-one backup solution.

    Provided By Symantec

  • White Papers // Jan 2014

    ESG Lab Review: Symantec NetBackup 5230 Appliance

    Fuss-free backup in less than 25 minutes. According to ESG research, nearly 64 percent of IT budget was spent on maintaining existing infrastructure. Discover how Symantec NetBackup 5230 can overcome such infrastructure complexity and create an efficient backup and recovery environment.

    Provided By Symantec

  • White Papers // Jan 2014

    Solution Overview: Symantec NetBackup Appliances

    Reduce backup cost and complexity with Symantec appliances Discover how to enhance backup and disaster recovery by eliminating the hidden productivity costs of acquiring, building and integrating your own servers and storage with Symantec NetBackup 5200 Series Appliances.

    Provided By Symantec

  • White Papers // Jan 2014

    The Truth About Online Trust

    Trust is a fundamental currency on the web. At one level, building trust is a simple balanced equation: higher levels of trust on one side = more trusting users willing to complete interactions and transactions on the other. This White Paper discusses how to make the most of the opportunity...

    Provided By Symantec

  • White Papers // Jan 2014

    Mastering Multi-Use SSL

    SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, multi-use certificates can provide greater flexibility than traditional ones. Multi-use certificates protect multiple Fully Qualified Domain Names (FQDNs) and subdomains, which means they lower administrative costs and simplify certificate installation, management,...

    Provided By Symantec

  • White Papers // Jan 2014

    Website Security Threat Report 2013

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Jan 2014

    Vulnerability Assessment

    Criminals are constantly looking for new vulnerabilities or weaknesses in websites and they often have high levels of success. Malware infections or exploited vulnerabilities could significantly impact the safety of customer information. With today’s increasingly smart malware infections and consequent online data loss, your business must do more than simply...

    Provided By Symantec

  • White Papers // Jan 2014

    Phishing – The latest tactics and potential business impacts

    You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cybercrime ecosystem. From virtual server hacking to mobile phone scams, phishing is a potent threat and can seriously...

    Provided By Symantec

  • White Papers // Jan 2014

    The Power to Destroy: How Malware Works

    Nearly a quarter of IT managers simply don’t know how secure their website is. It’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community. Malware takes many different forms. It can log keystrokes, lead to data...

    Provided By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Provided By Symantec

  • White Papers // Oct 2013

    Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

    This whitepaper discusses what to look for in a virtualization protection solution and considers the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. This document is a guide to assessing the total cost of ownership for...

    Provided By Symantec

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Oct 2014

    Infographic: Symantec’s 2014 Internet Security Threat Report

    An infographic report showing the trends of cyber attacks with corresponding statistics to help you understand the current situation of security cyberspace. It looks at vulnerabilities in mobile OS as well as browsers along with spear phishing, spam and bots and gives you in depth information about how Symantec is...

    Sponsored By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Sponsored By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Effective Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Dec 2014

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Apr 2013

    Enterprise Anti-Virus Protection - Analyst Report by Dennis Technology Labs

    The results are in. Symantec Endpoint Protection rated best overall in total accuracy in independent, real-world tests recently published by Dennis Technology Labs.This report by Dennis Technology Labs aims to compare the effectiveness of anti-malware products provided by well-known security companies.The products were exposed to internet threats that were live...

    Provided By Symantec

  • White Papers // May 2007

    Symantec Enterprise Vault: File System Archiving

    For more than 25 years, organizations have been attracted to the idea of providing different storage layers according to the relevance of data, an approach referred to as Hierarchical Storage Management (HSM). Today, however, companies accumulate an enormous amount of information, presenting new challenges. In addition to simply storing the...

    Provided By Symantec

  • White Papers // Sep 2011

    Internet security in the age of roaming users

    The whole concept of business - how it's done, when it's done, where it's done - is changing radically, and the legions of mobile workers are leading the change. While cloud computing benefits businesses by allowing employees to work remotely, this model also introduces a host of new security risks....

    Provided By Symantec

  • White Papers // Oct 2012

    Five considerations when choosing an archiving solution

    In this white paper, we explore the five key points that you should consider when choosing an archiving solution: - Think long-term; - Evaluate how easy it is to manage; - Consider how much data you will need to monitor; - Look out for solutions that are scalable and innovative;...

    Provided By Symantec

  • White Papers // Sep 2009

    Symantec NetBackup PureDisk: Optimizing Backups With Deduplication for Remote Offices, Data Center and Virtual Machines

    Modern endeavours find themselves faced with the issue of fast paced growing data. In fact, data growth has been predicted to be in the range of 50-60% per year. But data, instead of being confined to a single centre, is often spread across multiple data centres, remote offices and virtual...

    Provided By Symantec

  • White Papers // Sep 2011

    Email, archiving and productivity

    Is your email system holding back your business? While email has become an indispensible technology, it presents a new set of issues for businesses, from storage demands to increased IT requests to searching difficulties. Companies looking to solve these problems are increasingly looking at hosted email archiving solutions, a centralised...

    Provided By Symantec

  • White Papers // Feb 2009

    Protection You Can Count On

    For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company's bottom line if that data isn't protected. SMBs should...

    Provided By Symantec

  • White Papers // Mar 2009

    IT Management in Tough Economic Times

    Every small and midsize business knows what these are: manually upgrading applications, applying patches, provisioning servers, fixing the same problems over and over. All too often, IT organizations find themselves caught up in a cycle of service and support that is anything but efficient. But in tough economic times, the...

    Provided By Symantec

  • White Papers // Jan 2009

    Report Sheds Light on a Flourishing Underground Economy

    As the Symantec Report on the Underground Economy shows, a wide variety of goods and services are being advertised on underground economy servers, and the online underground economy itself has evolved into a self-sustaining marketplace. With the online underground economy now such a key sector of the criminal world, small...

    Provided By Symantec

  • White Papers // Jan 2009

    Improve Your System Recovery Times

    It's no exaggeration to say that businesses today require more from their Microsoft Windows systems than ever before. That's partly due to the explosive rise in data volumes. But it's also due to the very nature of today's 24x7 business environment. Whatever the cause, the demand for system availability has...

    Provided By Symantec

  • White Papers // Nov 2011

    Guide to social media use in your business

    Are you on Twitter, Facebook or Google+? Even if you're not, you should know about social networking's benefits and risks for business. There's no doubt social networking is becoming almost ubiquitous, but CIOs and IT managers aren't necessarily keen on it. Social networking can have business benefits, but it brings...

    Provided By Symantec

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // May 2009

    Symantec: Malicious Code Activity Spiked in 2008

    As malicious code continues to grow at a record pace, attackers are shifting away from the mass distribution of a few threats to the micro-distribution of millions of distinct threats. Moreover, these cybercriminals are intent upon distributing threats that steal confidential information, particularly bank account credentials and credit card data.

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jan 2009

    What the Latest Symantec Threat Report Means to SMBs

    As the latest Symantec Internet Security Threat Report amply demonstrates, malicious code activity grew at a record pace in 2008, and confidential information was its primary target. The report, which provides a global view of the state of Internet security, shows that there, continues to be a well-organized underground economy...

    Provided By Symantec

  • White Papers // Jul 2014

    Turning to Integrated Cloud Security to Deliver Maximum Cloud Protection

    According to a recent IDC research, nearly 90% of IT spending will be on cloud services by the end of the decade1. With the new era ahead, are you prepared to meet the inherent risks that come with migrating to the cloud? In this resource, uncover how cloud-based security can...

    Provided By Symantec

  • White Papers // Jan 2009

    Superior Protection for the Windows Environment

    Today most small and midsize organizations rely on Microsoft Windows to run their business and keep their employees productive. And each day, these organizations have to protect against viruses and other malware, back up and recover mission-critical data and systems, and manage their Windows environment to keep everything running smoothly....

    Provided By Symantec

  • White Papers // Jan 2009

    The Value of Security Suites

    While the recent shutdown of systems hosted by McColo was a milestone in the war against spam, the shutdown was little more than a short-term obstacle for spammers. As the threat landscape continues to evolve, small and midsize businesses need to stay vigilant and informed. By gaining a greater awareness...

    Provided By Symantec

  • White Papers // May 2009

    Managed Outcome: A New Paradigm for IT Departments

    A real-world example of the benefits of the Managed Outcome model is offered by Forrester Research According to Forrester, "A successful transition to a Managed Outcome relationship typically yields an additional 20% to 30% savings improvement" beyond typical expectations from outsourcing technical staff. Forrester adds that other key benefits of...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault 8.0 Security Model for Automatic Classification Engine 8.0

    This paper will give readers a better understanding of how the Enterprise Vault (EV) Intelligent Archiving solutions integrate with security features already built into Active Directory, SQL, and Enterprise Vault. It will also show how to manage access to the applications securely in line with organizational preferences. This whitepaper is...

    Provided By Symantec

  • White Papers // Mar 2009

    Data Deduplication: The Smart Choice in Virtual Environments

    IT managers and executives are in a tough spot. Cost reduction is a non-negotiable objective this year, while user expectations remain high and demand continues to rise. It's no surprise, then, that Symantec's recently released 2008 State of the Data Center report found a flurry of activity is being aimed...

    Provided By Symantec

  • White Papers // Feb 2009

    Enterprise Vault Automatic Classification Engine Enterprise Vault 8.0

    The Automatic Classification Engine was designed for organizations that do not want to rely on users to make classification decisions or impact their productivity. ACE is an ideal solution for applying context to an organization's archived data in the form of retention and searchable policies. Items classified by these policies...

    Provided By Symantec

  • White Papers // Apr 2009

    Are You Getting the Best Security for Your Money?

    Managing and protecting every device in an enterprise isn't easy. But an enterprise puts itself at risk if its IT organization lacks the visibility to protect the business' sensitive information, wherever it may be. Such visibility is not possible with a patchwork of security point products .To ensure that their...

    Provided By Symantec

  • White Papers // Apr 2009

    Enterprise Vault 8.0: Technical Overview

    Unstructured content like email and files are a huge management problem for companies of all sizes. The growth of this information in the form of email and files on storage devices and frontline servers are causing headaches as companies attempt to manage IT risk but maximize performance. This whitepaper has...

    Provided By Symantec

  • White Papers // Mar 2009

    Future-Proof Your IT Infrastructure

    Today's tough economic climate is challenging companies to reduce costs while continuing to focus on improving efficiencies. For IT departments everywhere, it's truly a "do more with less" dilemma. Client and server management suites from Symantec allow organizations to significantly reduce the hidden costs of managing endpoint systems throughout the...

    Provided By Symantec

  • White Papers // Mar 2009

    Enterprise Vault 8.0: Optimized Single Instance Storage (OSIS)

    This whitepaper introduces the new Enterprise Vault storage model launched in version 8.0. It will explain how the new model can help provide industry-leading archive storage footprint reduction through single instance storage and compression, as well as describe the various components and technologies employed within Enterprise Vault to do this.

    Provided By Symantec

  • White Papers // Nov 2007

    Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies

    Veritas NetBackup 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage...

    Provided By Symantec