Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Case Studies // Sep 2013

    Cost of Data Breach Study -Italy 2013

    Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...

    Provided By Symantec

  • White Papers // Sep 2013

    What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Companies today are losing valuable intellectual property (IP) on a regular basis. While many security initiatives focus on threats posed by cyber criminals and hackers, there is a less obvious player in the theft of corporate assets: employees. In most cases these trusted employees are moving, sharing, and exposing sensitive...

    Provided By Symantec

  • White Papers // Feb 2014

    Symantec Intelligence Report

    The threat landscape is ever-evolving, keeping security pros constantly on their toes. Staying up-to-date with the latest information is critical to protecting your organization and its confidential assets from detrimental attacks. In the latest issue of Symantec’s Intelligence Report, uncover details about the current security trends and threats to...

    Provided By Symantec

  • Webcasts // Jan 2012

    Secure Cloud Computing - Symantec O3

    In this webcast, the presenter explains about Symantec O3. The Symantec O3 is a cloud information protection platform that provides context-based access control, information security and information management as a service for cloud applications and services.

    Provided By Symantec

  • Webcasts // Aug 2009

    How Does the State of Spam Affect Your Small Business?

    Spammers use popular events to cover their tracks?. The recent death of Michael Jackson and its subsequent public interest show that spammers are willing to use any notable event as a cover to distribute their messages. Symantec State of Spam report shows that 90 percent of all email coming into...

    Provided By Symantec

  • Webcasts // Aug 2009

    It's Not What You Know, It's Who You Know. Not All Security Vendors Are Created Equal

    Driven by the rising tide of organized cyber-crime and the increased sophistication of hackers, targeted attacks are increasingly aimed at stealing the confidential information. For every business, the ability to recognize and respond to threats rapidly has never been more critical. As TBR's Security Infrastructure Benchmark study reveals, not all...

    Provided By Symantec

  • Webcasts // Aug 2009

    Respond to Threats Rapidly

    The threat landscape is evolving dynamically. Today's attacks are more targeted and malicious than ever before. Here's what one can do to respond to these attacks and ensure the organization is protected. Symantec is the worldwide leader in comprehensive endpoint protection. In 2008, Symantec responded to an average of more...

    Provided By Symantec

  • Webcasts // Jan 2012

    Continental Technologies (CTI): Security and Data Protection

    In this webcast, the presenters share their facing challenges about security. The presenters also explain how works the security and storage solutions which is provided by Symantec and to help their customers with their IT needs.

    Provided By Symantec

  • Webcasts // Aug 2009

    Achieve "Proactive Compliance" Through Automation

    The presenter of this webcast examines how the organization can achieve "Proactive compliance" by standardizing on IT controls and automating the compliance process. Leveraging a Capability Maturity Model as a framework, the presenter will discuss solutions which can be deployed to help to reach this goal. The presenter will also...

    Provided By Symantec

  • Webcasts // Jan 2011

    Norton Secured Seal Powered by VeriSign: Partner Thoughts

    In this webcast, the presenter explains about Verisign. The presenter also discusses about the transition of VeriSign SSL (Secure Sockets Layer) to Norton Secured Seal Powered by VeriSign. The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission over the Internet.

    Provided By Symantec

  • Webcasts // Aug 2009

    Expand Your Data Recovery Capabilities With Complete System Protection

    Organizations around the world trust market leading Symantec Backup Exec technology to protect business critical applications and data, but how to backup and recover entire servers or desktops in the event of a failure or disaster? The attendee of this webcast will discover how Backup Exec System Recovery complements and...

    Provided By Symantec

  • Webcasts // Jan 2012

    LPI Integration & Symantec Endpoint Protection 12: Partner Thoughts

    In this webcast, the presenters explain about Symantec and its benefits. The presenters also discuss the benefits of standardizing on Symantec Endpoint Protection 12 and the value of holding the SMB Specialization.

    Provided By Symantec

  • Webcasts // Jul 2009

    Using Best Practices to Comply With NERC Cyber Security Compliance

    Electric power companies face increasing regulatory requirements, including NERC CIP, Sarbanes Oxley and others. To maintain these regulations can be costly and time-consuming. Moreover, 2009 is a critical year for energy and utility companies as The North American Electric Reliability Corporation (NERC) regulations require that utilities be "compliant" by July...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure and Manage the Endpoint With Altiris Client Management Suite

    90% of incidents would not have happened if the endpoints simple had the appropriate patch installed? Good systems management is key to protecting the systems from vulnerabilities. The attendee will learn how to configure and protect the endpoint using Altiris Client Management Suite. This industry-leading product will help as an...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce the Cost and Complexity of Compliance

    Is the regulatory compliance program costly and time-consuming? Is one having trouble providing ongoing support for audits? Does one have the resources to keep up with ever-changing regulations and industry standards? What about the overall IT risk posture?. Does one know if all the IT assets are properly protected? Can...

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • Webcasts // Jan 2010

    Unified IT Security Management With Symantec Protection Center and Symantec Protection Suites

    Symantec Protection Center and Symantec Protection Suite introduce a new way organizations will realize the benefits of intelligent management and unified security solutions in today's complex IT infrastructures. Minimal insight into the threats the environment faces, slow responses to security incidents when they take place and a lack of automation...

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • Webcasts // Jan 2012

    Email Spam Filter & Virus Protection Solution - Symantec.cloud

    In this webcast, the presenter asks how to keep one business safe? The presenter tells about Symantec.cloud Email Security services and its protect against email spam, viruses, phishing and other email threats via the cloud.

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2009

    Symantec Log Management Service: Capture Log Files, Respond to Threats and Address Growing Compliance Demands

    IT risk and compliance demands are heightening the need for a security approach that delivers comprehensive security monitoring and real-time incident alerting that expands support beyond networks to include critical servers, applications and end points, compliance reporting that eases administrative burdens and can accommodate custom reporting needs and flexible archive...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • White Papers // Apr 2014

    Protect Against Targeted Attacks with Security Intelligence

    Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims. This white paper analyses the evolving threat landscape and how the use of security intelligence services can...

    Provided By Symantec

  • White Papers // Apr 2014

    Symantec Cybercrime Survival Guide

    The web has been overrun by data thieves. In the battle of obtaining your information, ignorance is their greatest weapon, knowledge their greatest foe. Every website owner needs to understand the risks posed by cybercrime and how to prevent it. This essential survival guide will help you navigate the...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • Webcasts // Sep 2009

    Manage and Secure Your Mobile Devices Efficiently

    The attendee of this webcast will learn how Symantec makes it easy to manage and secure mobile devices efficiently. A priority for IT organizations is to efficiently secure all their endpoints and gain confidence that corporate assets and business operations are protected and updated - all while controlling costs. After...

    Provided By Symantec

  • Webcasts // Sep 2009

    Prevent Security Breaches by Protecting Information Proactively

    Which organizations want to be in the news because of a security breach? Threats to corporate information continue to increase and IT organizations now have to worry about internal and external attack vectors - including employees who may either intentionally or accidentally risk critical information. Loss of this critical information...

    Provided By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Provided By Symantec