Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Jun 2009

    Getting PCI DSS Compliance Right: How Identity Management Can Help Secure Information Access

    Complying with the requirements of PCI DSS is a top IT priority for many companies today. But focusing strictly on compliance isn't enough for companies that are charged with protecting sensitive data, as suggested by recent well-publicized security breaches. When companies shift the focus instead to building a secure infrastructure,...

    Provided By Sun Microsystems

  • White Papers // Apr 2009

    FOAF+SSL: RESTful Authentication for the Social Web

    The paper describes a simple protocol for RESTful authentication, using widely deployed technologies such as HTTP, SSL/TLS and Semantic Web vocabularies. This protocol can be used for one-click sign-on to web sites using existing browsers | requiring the user to enter neither an identifier nor a password. Upon this, distributed,...

    Provided By Sun Microsystems

  • White Papers // Aug 2009

    Crossbow: A Vertically Integrated QoS Stack

    This paper describes a new architecture which addresses Quality of Service (QoS) by creating unique flows for applications, services, or subnets. A flow is a dedicated and independent path from the NIC hardware to the socket layer in which the QoS layer is integrated into the protocol stack instead of...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    PCI DSS Compliance Webinar Replay

    The attendee of this webcast will learn how identity and access management solutions form one of the most important building blocks in establishing the necessary safeguards against malicious access to sensitive information. The presenter will look at how identity management can help address some of the key requirements of PCI...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Solaris 10 Security Features

    The presenter of this webcast talk about several underutilized security capabilities of the Solaris 10 OS. The presenter focuses on 5 key security features, provides examples of each, and touches on how they build on and benefit each other.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Energy Efficient Data Center: The Role of Modularity in Design and Deployment

    The attendee of this webcast will learn how to create a state of the art enterprise data center by combining best of breed modules to yield performance and efficiency across the board. This in-depth technical webcast is created for architects in the IT industry by Sun's engineering community and offers...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Attacking Complexity With Simplicity - Sun Identity Management

    Sun offers a pragmatic approach for solving today's everyday identity management issues while positioning the business for the growth challenges of tomorrow. In order to maintain security, mitigate risk and reduce costs, organizations can build their secure, everyday enterprise with Sun's flexible, market-leading identity management solutions. The presenters of this...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Access Management, Federation and Secure Web Services With OpenSSO Enterprise

    The presenters will discuss OpenSSO innovation and how it pushes access management, federation and secure Web services capabilities to a new level. The attendee will learn how to solve challenges around internal access management, extranet authentication, federation, and securing Web services with a single, open source solution.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    From Cost to Profit Center: Optimize Your IT for Success Webinar

    In these difficult economic times, companies must improve their business performance as much as possible. This webcast will help to turn the IT department into a profit center. The attendee will learn how to understand timing issues to meet business needs and maximize the resources and how to reduce capital...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Net Talk: Sun Identity Manager 8.0

    The presenter of this webcast discusses key market drivers in Identity Management today new features Sun has developed to address those drivers and the increased Role Management capabilities built into this latest release.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Access Management & Federated Single Sign-On

    How to enable federated communication without tearing apart the existing identity infrastructure? The presenter will give an overview of the technology and issues behind the management of identities - both inside and outside the organization - and examines Sun's standards-based access management and federated single sign-on solutions.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Create a Secure Environment to Share and Explore

    Sun has been an industry leader in developing and implementing innovative security technologies and solutions. The presenter gives succinct overview on Sun's technology solutions from the operating platform to encryption management.

    Provided By Sun Microsystems

  • White Papers // Nov 2009

    Sun StorageTek Crypto Key Management System

    This paper deals with security and authentication functions of the Sun StorageTek Crypto Key Management System Version 2.0 or KMS 2.0. KMS 2.0 represents the entire gamut of the products including the main system and the various update to it. The system is designed to ensure secure and automatic key...

    Provided By Sun Microsystems

  • White Papers // Jan 2009

    Reinventing IT in Troubling Times

    Today, IT is on the cusp of innovation more so than any time in the last 10 years. These changes coincide with the advent of new period of economic instability that will require IT organizations to rely more on an integrated systems management framework. Symantec is committed to providing customers...

    Provided By Symantec

  • Downloads // May 2009

    Podcast: 10 Things Small Businesses Must do to Protect & Secure Data

    Small business owners and IT personnel agree that securing and backup up their data is critical - yet why are so many businesses falling short? Often, they need best practices to know where to begin. Donna Childs, author and small business consultant provides guidelines so small businesses can take the...

    Provided By Symantec

  • White Papers // Oct 2011

    Protecting the enterprise: Best practice for information security

    Keeping a connected enterprise secure requires both proactive and reactive approaches. The number of threats from cybercriminals -- malware, insider data breaches and even cyber-espionage -- is growing, so organisations should have consistent and unified barriers in place to prevent attacks and protect the business against them. This best practice...

    Provided By Symantec

  • White Papers // Nov 2011

    Guide to social media use in your business

    Are you on Twitter, Facebook or Google+? Even if you're not, you should know about social networking's benefits and risks for business. There's no doubt social networking is becoming almost ubiquitous, but CIOs and IT managers aren't necessarily keen on it. Social networking can have business benefits, but it brings...

    Provided By Symantec

  • White Papers // Apr 2012

    Malware threat landscape 2012: How to defend your business

    Every time you or one of your employees connects to the Internet, your organisation is at risk of infection by malware. Some methods of connection are safer than others, but the main vectors of a malware attack are the tools most employees and customers use every day: web browsing and...

    Provided By Symantec

  • Webcasts // Mar 2011

    Symantec Study: SMBs Not Prepared For Disasters, Don't Act Until It's Too Late

    Symantec's 2011 SMB Disaster Preparedness Survey found that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also revealed that disaster-related downtime costs a typical SMB $12,500 per day. Learn more about the survey findings...

    Provided By Symantec

  • Webcasts // Apr 2011

    Defeating the Cyber Mutants: Protecting Your Business from Modern Malware

    Modern malware rarely strikes the same way twice. Today's malicious code rapidly mutates, bypassing traditional defences. This webcast will examine these threats and the new technology that organizations from small businesses to large enterprises can use to protect their physical and virtual environments. Attend this webcast to learn: Why traditional...

    Provided By Symantec

  • Downloads // Jun 2008

    Symantec Backup Exec System Recovery Server Edition

    Symantec Backup Exec System Recovery 8 restores systems in minutes, not hours or days, even to dissimilar hardware and virtual environments. Backup Exec System Recovery 8 now includes: flexible offsite protection to an FTP location or secondary disk; granular recovery of Microsoft Exchange and SharePoint documents or files and...

    Provided By Symantec

  • Webcasts // Apr 2009

    Data Protection Reporting for Your Virtual Machines

    Veritas Backup Reporter (VBR) provides the better insight into the virtual machine backups. Which virtual machines are or most error prone? How much faster do the VCB (VMware Consolidated Backups) finish compared to the traditional backup clients running inside the virtual machines? How much data is backing up for each...

    Provided By Symantec

  • Webcasts // Apr 2009

    Reducing Storage Requirements and Recovery Times for Your Critical Microsoft Exchange Information

    Today email is the communication vehicle that keeps most businesses running. As Exchange email volumes increase, there is a growing challenge to efficiently manage and protect this critical data. The attendee of this webcast will learn how Symantec can help to easily manage and quickly recover the Exchange data volumes...

    Provided By Symantec

  • Webcasts // Apr 2009

    Minimizing Risk - Will Your High Availability/Disaster Recovery Plan Work?

    Configuration drift is a major problem that IT professionals face and must manage in the event a disaster occurs. To address this issue, Symantec is introducing Veritas CommandCentral Disaster Recovery Advisor, an agentless solution that supports all major computing platforms. Disaster Recovery Advisor scans data center infrastructure to detect any...

    Provided By Symantec

  • Webcasts // Mar 2009

    Case Study: Best Practices in Endpoint Security: How a Leading Company Secured Their Endpoints and Infrastructure Using Symantec Services

    The attendee will learn the best practices and deployment strategy for a Symantec Network Access Control (SNAC)-based solution for a State agency. The agency had to provide non-employees network access to the internet and public records databases, while at the same time providing network access (to highly confidential data) to...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right: Cost, Risk and Readiness

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // Mar 2009

    Data Loss During Downsizing: When Employees Exit, so Does Data

    The presenter of this webcast addresses "Data Loss During Downsizing," the results of a survey conducted by the Ponemon Institute. In these tough economic times, many companies are going through layoffs or downsizing. According to the results, more than half of ex-employees admit to stealing company data. The attendee will...

    Provided By Symantec

  • Webcasts // Apr 2009

    Symantec Internet Security Threat Report Volume XIV - Key Facts and Figures

    The Internet threat landscape continues to challenge the organization's information with increasingly complex and sophisticated attacks. This is making it even more important to have access to global threat intelligence that can assist in making informed decision on how best to protect the company's assets. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Apr 2009

    Containing Vendor Sprawl: Improve Security, Reduce Risk & Lower Costs

    The presenter of this webcast will explain the cost of managing multiple vendors across disparate products and outline the benefits of consolidating security, storage, and systems management solutions with one strategic vendor. The attendee of this webcast will learn about top security challenges in the next 12 months and how...

    Provided By Symantec

  • Webcasts // Mar 2009

    Getting PCI Compliance Right

    With the current credit crisis in the banking industry and an increasingly aggressive regulatory environment, financial institutions, whether regional or multinational, face a significant challenge: how to lower the cost of compliance and at the same time both reduce risk and establish audit readiness. The times demand a systemic approach...

    Provided By Symantec

  • Webcasts // Mar 2009

    Optimizing Veritas NetBackup With Deduplication

    In today's economy standard practices and conventional backup technologies aren't enough. Simply buying additional disk or tape storage to accommodate data growth is no longer a viable solution when budgets are cut. Enter a technology called data deduplication - the means for removing redundant data. Data deduplication can dramatically reduce...

    Provided By Symantec

  • Webcasts // Jan 2009

    Symantec Log Management Service: Capture Log Files, Respond to Threats and Address Growing Compliance Demands

    IT risk and compliance demands are heightening the need for a security approach that delivers comprehensive security monitoring and real-time incident alerting that expands support beyond networks to include critical servers, applications and end points, compliance reporting that eases administrative burdens and can accommodate custom reporting needs and flexible archive...

    Provided By Symantec

  • Webcasts // Jul 2008

    IT Analytics for Symantec Endpoint Protection - Uncover New Ways to More Effectively Manage and Secure Your Environment

    The attendee will learn how the new IT Analytics Symantec Endpoint Protection Pack will provide enhanced visibility into the health of the environment, allowing to make strategic decisions to combat potential security threats. The IT Analytics Symantec Endpoint Protection Pack is an advanced reporting solution that leverages business intelligence capabilities...

    Provided By Symantec

  • White Papers // Jun 2014

    The Increasing Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Oct 2014

    The Cyber Resilience Blueprint: A New Perspective on Security

    The traditional workplace is changing to digital workplace at an exponential rate. This shift has made the workplace more agile and competitive – yet also more vulnerable to cyber attacks. This report goes over the paradigm shift that uses security intelligence laying the foundation for a resilient security strategy. It...

    Provided By Symantec

  • White Papers // Jul 2011

    Small Business Endpoint Protection Performance Benchmarks - July 2011

    New independent research from performance testing company, PassMark, ranked Symantec Endpoint Protection Small Business Edition #1 in overall performance. Test results show that Symantec's small business solution consumed the least processor cycles during security scanning, executed on-demand scans twice as quickly as Kaspersky, and performed web browsing in half the...

    Provided By Symantec

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • White Papers // Sep 2011

    Internet security in the age of roaming users

    The whole concept of business - how it's done, when it's done, where it's done - is changing radically, and the legions of mobile workers are leading the change. While cloud computing benefits businesses by allowing employees to work remotely, this model also introduces a host of new security risks....

    Provided By Symantec

  • White Papers // Nov 2011

    Key eDiscovery Issues to Consider in 2011

    This white paper discusses the threats that organizations face from spam, malware and other threats directed at their messaging and Web capabilities. It uses research from recent Osterman Research surveys, as well as information from a variety of other data sources to illustrate how to address and overcome security gaps.

    Provided By Symantec