Overview: A world leader in Internet security technology and technology solutions that enable corporate organizations to manage the cost of ownership associated with supporting and servicing users of laptop computers and other mobile devices.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Symantec Corporation.
Research offered by Symantec Corporation
2010 Annual Study: U.S. Enterprise Encryption Trends by Symantec Corporation. December 03, 2010 - This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
2010 SMB Information Protection Survey by Symantec by Symantec Corporation. June 23, 2010 - This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
2012 - Endpoint Security Best Practices Survey by Symantec Corporation. September 06, 2012 - Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
2012 Endpoint Security Best Practices Survey by Symantec Corporation. June 29, 2012 - Today’s SMBs are increasingly forced to invest in new measures to protect their endpoints and their business from cyber threats. This resource explores key findings from the Symantec 2012 Endpoint Security Survey and offers best practices and recommendations for reducing the risk of a successful cyber attack.
2012 Endpoint Security Best Practices Survey Results by Symantec Corporation. April 08, 2013 - This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know by Symantec Corporation. June 11, 2009 - Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
6 Steps to Prevent a Data Breach by Symantec Corporation. September 03, 2009 - Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches.
7 Requirements of Data Loss Prevention by Symantec Corporation. March 2009 - This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
8 Questions to Ask Before Moving to the Cloud by Symantec Corporation. March 01, 2013 - Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.
A Candid Examination of Data Deduplication by Symantec Corporation. August 11, 2009 - Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available.
A Candid Examination of Data Deduplication by Symantec Corporation. August 26, 2009 - This DCIG analyst report will provide a detailed look at the benefits, primary role and implementation methods of data deduplication.
About to Buy Guide: Mobile Device Management Software by Symantec Corporation. March 30, 2012 - Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Agent based vs host based virtualization backups: has the market shifted? by Symantec Corporation. May 13, 2013 - This E-Guide provides insight into the evolution of data protection for virtual environments and reveals how host-based virtualization backups used to be king, but agent-based approaches are now catching on.
Agent vs Agentless VM Backup and Recovery - Data Sheet by Symantec Corporation. October 31, 2012 - This brief paper condenses the confusion of what a backup agent is or does with unbiased information so you can make the right choice for your environment. Check out each method now highlighting the pros and cons of each so you can make informed decisions without any distractions.
American Equipment, Symantec Technologies and Wasatch Software Success by Symantec Corporation. July 05, 2012 - Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.
Anatomy of a Data Breach - Why Breaches Happen and What to Do About It by Symantec Corporation. August 18, 2010 - This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It by Symantec Corporation. August 10, 2009 - This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Archiving in the Cloud: Essential Tips and Questions to Answer by Symantec Corporation. November 20, 2012 - Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.
Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments by Symantec Corporation. February 28, 2013 - This white paper discusses what to look for in a virtualization protection solution and explores the features and benefits of both separate and unified solutions for protecting the virtual components of a modern infrastructure. Read on to discover the total cost of ownership of these two types of solutions and learn the ins and outs of each.
Backup Essentials for Protecting your Data and your Business by Symantec Corporation. June 29, 2012 - This informative e-book provides key guiding principles for effective and efficient disaster recovery. Discover insights into how to ensure your backup solution meets your organization's unique needs and find out what steps you should take ahead of time to minimize business disruptions when disasters occur. Read on now to learn more.
Backup Exec 2010: Archiving Options by Symantec Corporation. July 15, 2010 - Symantec makes it easier for companies of all sizes to store, manage, protect, and discover Exchange and Windows file servers, with Backup Exec’s new Archiving Options, powered by market-leading Symantec Enterprise Vault. Learn and explore Backup Exec 2010 Archiving Options in this insightful white paper.
Backup Exec 2010: Deduplication Option by Symantec Corporation. June 24, 2010 - Data deduplication offers companies the opportunity to dramatically reduce the amount of storage required for backups and to more efficiently centralize backup data from multiple sites for assured disaster recovery. This paper discusses Backup Exec 2010 which now includes integrated deduplication capabilities.
Backup Exec 2010: Protect More, Store Less, Save More by Symantec Corporation. June 24, 2010 - Would you like to improve your backup performance while reducing storage costs? Join this webcast to learn how to easily eliminate excess storage consumption with ease through integrated deduplication and archiving technology introduced in Symantec Backup Exec 2010.
Best and worst practices for email archiving in Exchange Server by Symantec Corporation. September 09, 2011 - Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.
Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation. January 05, 2009 - Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol.
Best Practices for Archiving Lotus Domino Environments by Symantec Corporation. March 2008 - This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Best Practices for Backup and Recovery by Symantec Corporation. June 2008 - Check out this Symantec webcast discussing best practices for backup and recovery
Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery by Symantec Corporation. November 18, 2010 - The benefits of server virtualization are becoming so well-known that it has become a mandate in many organizations to virtualize all new application servers. But a barrier that is sometimes invisible to enterprises is how to best manage their virtual servers teams and which of their responsibilities, should be centralized. Read on to learn more.
Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery by Symantec Corporation. December 27, 2010 - The benefits of server virtualization are becoming so well-known that it has become a mandate in many organizations to virtualize all new application servers. But a barrier that is sometimes invisible to enterprises is how to best manage their virtual servers teams and which of their responsibilities, should be centralized. Read on to learn more.
Best Practices for Defining and Establishing Effective Archive Retention Policies by Symantec Corporation. June 30, 2007 - Electronically stored information (ESI) has become a major source of business records, and any organization that uses ESI - from email to word processing to instant messaging - must manage those records. This paper explains best practices for establishing effective archive retention policies.
Best Practices for Endpoint Data Loss Prevention by Symantec Corporation. September 2008 - Find out the best practices for planning for and deploying an endpoint DLP tool in your corporation. The technology overview section of this document provides a closer look on how DLP works with other existing technologies and how best to integrate DLP in your environment.
Best Practices for Protecting Microsoft Exchange by Symantec Corporation. March 23, 2006 - The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
Best Practices for Windows Vista Planning, Migration, and Ongoing Management by Symantec Corporation. March 2008 - It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
Best Practices: Backing Up VMware with Veritas NetBackup by Symantec Corporation. January 01, 2009 - As there are many ways of using VMware technology, there are just as many methods available for protecting this innovative technology. System administrators and IT technologists can use this paper to determine one of three recommended solutions for protecting VMs. Each of these technologies has relative advantages and disadvantages.
Bringing the Network Perimeter Back From the 'Dead' by Symantec Corporation. December 03, 2012 - There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Business Value Analysis Study: Citizens Business Bank by Symantec Corporation. March 2009 - As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.
BYOD Platform Support: Why an iOS/Android Strategy Makes Sense by Symantec Corporation. February 28, 2013 - BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
BYOD Policy Creation Tips from Gartner by Symantec Corporation. November 27, 2012 - This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.
BYOD Security Policy Considerations and Best Practices by Symantec Corporation. November 26, 2012 - This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
BYOD Security Policy, not MDM, at Heart of Smartphone Security by Symantec Corporation. May 14, 2013 - This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Choosing a Cloud Hosting Provider with Confidence by Symantec Corporation. May 07, 2012 - This paper uncovers tips for choosing a cloud hosting provider and explores where and when to use cloud solutions, specific issues enterprises should raise with hosting providers before selecting a vendor, and ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Choosing Linux as a Strategic Platform by Symantec Corporation. December 27, 2010 - This Technology Spotlight discusses the growth of Linux as a strategic platform for enterprises as well as the evolving uses of Linux and its benefits. The paper also looks at the role of Symantec in this important market.
Cloud Backup Versus Cloud Storage Comparison by Symantec Corporation. December 05, 2012 - This exclusive SearchStorage.com E-Guide takes a close and clear look at cloud storage and backup so you can arm yourself with the correct facts. Check it out now for a comparison of cloud backup, cloud storage and storage in the cloud, and learn how to differentiate between cloud backup, recovery and restore.
Cloud Backup: Terms and Trends by Symantec Corporation. May 14, 2013 - This expert E-Guide recaps the results of a recent cloud backup survey and reports on your peers' experiences and satisfaction with it. It also examines how cloud backup fits into the broader cloud storage ecosystem and clears up some confusion around semantics.
Cloud Disaster Recovery: Practical Applications and Pointers for the SMB by Symantec Corporation. May 24, 2013 - This expert guide from SearchStorage.com discusses how cloud-based services can simplify and streamline your disaster recovery and outlines key phases of the DR planning process.
Cloud Endpoint Security: Considerations for Cloud Security Services by Symantec Corporation. February 26, 2013 - This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Cloud Endpoint Security: Considerations for Cloud Security Services by Symantec Corporation. May 17, 2013 - This e-guide from our experts at SearchSecurity.com will share some important information you should know about cloud-enabled security offerings, including the benefits of a cloud-based console and the factors you need to consider when evaluating products.
Cloud Endpoint Security: Considerations for Cloud Security Services and Management by Symantec Corporation. November 22, 2013 - In this comprehensive e-guide, experts Mike Chapple and Kevin Tolly explain the need for cloud security services. Uncover their take on five different cloud endpoint security services on the market today.
Cloud Storage: Specific Use Cases and Ground Rules for Getting Started by Symantec Corporation. May 24, 2013 - This expert guide from SearchCloudStorage.com examines recommended use cases for cloud storage applications, including backup, replication and content distribution. Read on and also learn what concerns you should address before you get started.
Cloud-Based Email Archiving Pros and Cons by Symantec Corporation. December 03, 2012 - Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest.
Comparing Email Archiving Software with General Archiving Software by Symantec Corporation. November 20, 2012 - Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.
Comprehensive SQL Server Data Protection with Symantec Backup Exec 11d by Symantec Corporation. March 2008 - Choosing the proper backup and recovery plan for SQL Server can be a daunting task. Read this white paper and learn which model best suits your organization and can ease administration.
Considering a BYOPC Strategy by Symantec Corporation. November 20, 2012 - Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Control Compliance Suite Trialware by Symantec Corporation. April 01, 2009 - Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation. July 15, 2010 - By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story.
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation. August 31, 2010 - This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business.
Data Deduplication Technology Tutorial: A guide to data deduping and backup by Symantec Corporation. August 16, 2010 - This data deduplication technology tutorial will look at all of the data dedupe alternatives and take a look at some of the most significant deduplication backup products. Learn about global data deduplication, what to look for in a data deduplication product, inline vs. post-processing deduplication, and more.
Data Loss Prevention Survey by Symantec Corporation. April 02, 2009 - Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands by Symantec Corporation. October 2008 - Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Deduplication Backup Basics for Small Businesses by Symantec Corporation. December 01, 2011 - Data deduplication is one of the hottest and must-have technologies in the storage world today. For companies that haven't yet implemented dedupe into their backup systems, the interest is growing. Read this expert E-Guide to learn the dedupe backup basics for small businesses.
Defending Systems on a Wide-open Network with Symantec Endpoint Protection by Symantec Corporation. July 02, 2012 - Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD by Symantec Corporation. November 30, 2012 - BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
DLP Content Discovery: Best Practices for Stored Data Discovery and Protection by Symantec Corporation. March 16, 2009 - According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions.
Domino Security Vulnerabilities to Watch For by Symantec Corporation. December 04, 2012 - Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.
Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by Symantec Corporation. October 24, 2013 - Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.
Don't Wait Until It's Too Late: Backup to the Cloud to Protect Your Business from Disaster by Symantec Corporation. September 30, 2011 - Access this white paper to learn how cloud-based backup is a compelling alternative to hardware solutions and on-premise software to protect data in case of severe computer or network outage.
e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff by Symantec Corporation. May 2008 - This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.
e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process by Symantec Corporation. June 2008 - The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation. July 2008 - This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
e-Book: Chapter 5 - Understanding the Data Collection Process by Symantec Corporation. August 2008 - Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards by Symantec Corporation. August 2008 - This paper explains Ten hidden e-discovery hazards reviewing everything from databases and storage to instant messages and smartphones which can help ward off e-discovery surprises.
E-Book: Storage for PACS by Symantec Corporation. December 29, 2010 - The exciting world of PACS in Healthcare IT is ever-changing and can be confusing, but the rewards are immense once these new technologies are implemented. Check out this informative E-book to learn more about emerging technologies like PACS storage needs, image exchange, and transforming your workstations into imaging hubs.
E-Discovery Cloud Considerations by Symantec Corporation. December 04, 2012 - In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
E-Guide: Backing up Your Virtual Server by Symantec Corporation. December 06, 2010 - Backing up virtual machines is tougher than you think; and the fact of the matter is it’s not a straightforward process! This guide will walk you through how to determine which method is best for your storage requirement.
E-Guide: Choosing a Data Archiving Strategy: Disk, Tape or Both? by Symantec Corporation. September 16, 2011 - Today’s organizations typically have three data archiving strategies they can choose from: disk archiving, tape archiving or a combination of both. This SearchDataBackup.com E-Guide offers insight into the advantages and disadvantages of each method, how to choose the best approach, and the best and worst practices of data archives.
E-Guide: Climbing the Uphill Battle of Exponential Data Growth by Symantec Corporation. December 06, 2010 - This guide provides a simple yet reliable approach to securing data for the long term though the efficient optimization of IT resources and a set of straightforward best practices for data protection. Learn archiving best practices, how to choose a data archiving tool, and how to put together the best data archiving strategy for your business.
E-Guide: How to secure virtual environments: 3 things to keep in mind by Symantec Corporation. October 20, 2011 - In order for virtualization administrators to achieve their prime goal, securing their virtual environment, they must carefully plan and execute an effective strategy. Access this expert e-guide to learn three crucial considerations for virtualization security and discover how to avoid common security issues.
E-Guide: Improving Storage Efficiencies in your Storage Environment by Symantec Corporation. December 21, 2010 - Storage efficiency is the ability to store and manage data that consumes the least amount of space with little to no impact on performance. Download this guide for tips on evaluating your data storage efficiency and learn how to increase overall efficiency in your enterprise storage environment.
E-guide: Top Tips for Today’s Archiver by Symantec Corporation. October 19, 2011 - Check out this E-Guide from SearchDataBackup.com to learn how to choose a data archiving strategy and if using tape or disk is the best archiving method for your business. Also learn other archiving best practices to keep in mind.
E-Guide: When do You Archive? When do You Backup? by Symantec Corporation. October 19, 2011 - Backups aren’t archives and archives aren’t backups. So how exactly do you differentiate the between the two? This SearchDataBackup.com can help you distinguish these storage technologies from one another by comparing them and outlining how each works. Read on to learn when you should archive and when you should backup.
eBook-- Defining an Email-Archiving Policy by Symantec Corporation. July 09, 2009 - Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity by Symantec Corporation. October 01, 2009 - Chapter 4 of this e-book gives advice on determining your email archiving goals and policies to establish a set of system features that match your company’s needs and boost archiving efficiency.
eGuide: Storage Challenges in Virtualized Server Environments by Symantec Corporation. February 26, 2013 - Access this exclusive, expert E-Guide from SearchVirtualStorage.com to learn about tools and tactics you can leverage to address and solve common storage challenges in virtual server environments, such as efficiency, speed, sprawl and end user expectations.
Eight Steps to Better Securing Exchange Server 2010 by Symantec Corporation. December 03, 2012 - Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010.
Email archiving FAQ by Symantec Corporation. November 19, 2012 - This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.
Endpoint Management - IT handbook by Symantec Corporation. September 13, 2012 - Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.
Endpoint Protection Small Business Edition by Symantec Corporation. September 05, 2012 - Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Endpoint Security Best Practices by Symantec Corporation. November 26, 2013 - In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
Endpoint Security Technology by Symantec Corporation. November 04, 2013 - Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
Enhancing Website Security with Algorithm Agility by Symantec Corporation. February 21, 2013 - Read this whitepaper to learn more about algorithm agility, its role in today's security landscape, and how it is helping businesses enhance online security through a more flexible, scalable approach to SSL certification.
Enterprise Vault and Microsoft Business Online Productivity Suite by Symantec Corporation. November 18, 2010 - Microsoft Business Productivity Online Suite (BPOS) is a set of Microsoft hosted messaging and collaboration services, which includes Exchange, SharePoint, LiveMeeting and Office Communications Online. This document outlines the integration of the offsite BPOS email service with an on-premises Enterprise Vault solution.
ESG: A Phased Approach to Network Access Control (NAC) by Symantec Corporation. July 2008 - Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
Evaluating SSL certificate security by Symantec Corporation. October 17, 2013 - SSL certificates can be confusing. Many choices are available, and avoiding the pitfalls can be difficult. This Webcast will aim to dispel the myths surrounding SSL certificate security and show you how to promote trust in your users by choosing the best type of certificate for your organization.
Evaluating SSL certificate security - Podcast by Symantec Corporation. October 25, 2013 - SSL certificates can be confusing. Many choices are available, and avoiding the pitfalls can be difficult. This podcast will aim to dispel the myths surrounding SSL certificate security and show you how to promote trust in your users by choosing the best type of certificate for your organization.
Evaluating SSL Certificate Security - Presentation Transcript by Symantec Corporation. November 01, 2013 - This presentation dissects the myths surrounding SSL certificate security, and shows you how to promote trust in your users by choosing the best type of certificate for your organization.
Exchange Insider E-Zine: Volume 8 by Symantec Corporation. September 15, 2011 - In this issue of Exchange Insider, we'll cover topics on how to prep for the BlackBerry Enterprise Server for Exchange 2010 SP1, find out if the Exchange 2010 Storage revamp is for the better, and look at the information rights management protection in Exchange 2010.
Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ by Symantec Corporation. November 04, 2013 - This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.
Expert Insight: Top Customer Backup Challenges and Purchasing Pitfalls to Avoid by Symantec Corporation. November 01, 2013 - This e-guide reveals the drivers behind today's increased backup capacity demands, and outlines the most common strategies used to address them. Discover five pitfalls your clients should avoid when evaluating their VM backup software options, and explore critical factors they can't afford to overlook before making a buying decision!
Expert Strategies to Securing a Virtual Environment by Symantec Corporation. November 21, 2012 - This expert e-guide presents three of the most common security problems that IT professionals face in virtual environments and how your business can best overcome them.
Expert Video Tip Transcript: Today's Cloud Backup by Symantec Corporation. March 11, 2013 - Access this exclusive Expert Video Tip transcript about current cloud backup options to explore a 10-question Chicago Storage Decisions 2012 Q&A with independent analyst Brien Posey. Read on to learn how cloud backup is being utilized across enterprises and get the scoop on various backup devices.
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by Symantec Corporation. October 09, 2013 - Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Exploring New Features, Uses for Secure Web Gateway Appliances by Symantec Corporation. February 08, 2013 - In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Four Things You Should Know About Securing Your Growing Business by Symantec Corporation. July 06, 2012 - SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Gartner 2013 Magic Quadrant for Endpoint Protection Platforms by Symantec Corporation. January 02, 2013 - This Magic Quadrant report from the experts at Gartner analyzes leading vendors in the endpoint security market, giving you all of the information you need to identify the vendor and solution right for you. Assess vendor strengths and weaknesses, compare offerings, and more by reading on now.
Getting Ahead of the Compliance Curve by Symantec Corporation. May 04, 2012 - As the number and complexity of compliance mandates continue to grow, organizations struggle to keep up, only meeting requirements in silos using a “checklist” approach. But this reactive approach only leads to more costs, inefficiencies and risk. Read now to uncover a proactive strategy that will help you get ahead of the compliance curve.
Getting Started with Online Storage for Backup Exec by Symantec Corporation. February 2008 - In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.
Global Data Deduplication Results with NetBackup PureDisk by Symantec Corporation. February 2008 - At the heart of NetBackup PureDisk customers will find flexible deduplication technology, a highly scalable software-based storage system, and integration with NetBackup for greater functionality.
Governance, Risk, Compliance: Policy Management Methods and Tools by Symantec Corporation. December 11, 2009 - IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.
Hidden Lynx - Professional Hackers for Hire by Symantec Corporation. September 17, 2013 - In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.
Honey Stick Report Results by Symantec Corporation. April 09, 2012 - The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.
How Archiving Reduces the Cost and Complexity of "Reactive" eDiscovery by Symantec Corporation. September 08, 2011 - This paper attempts to identify and clarify the benefits an archive can provide in the initial phases of the electronic discovery process and look at some of the features companies should look for to ensure those benefits are maximized.
How iOS Encryption and Data Protection Work by Symantec Corporation. May 15, 2013 - This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
How you can secure your mobile app market by Symantec Corporation. December 31, 2012 - This comprehensive white paper explores an innovative, straightforward and easy-to-manage technology. Read on as this white paper details the rise of mobile applications and why code signing certificates are essential to protection the entire mobile apps ecosystem.
Implementing Highly Available Data Protection with Veritas NetBackup by Symantec Corporation. February 2008 - This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site.
Improving Deduplication Performance in Virtual Environments with Symantec Backup Exec 2010 R3 by Symantec Corporation. November 22, 2011 - Check out this white paper for an introduction to source dedupe and a list of the benefits it can provide. You will see several real-world scenarios in which source dedupe is utilized to solve the challenges associated with older, obsolete backup methods, and learn about the differences between deduping in a physical and virtual environment.
Improving Results for Legal Custody of Information - August 2008 by Symantec Corporation. March 09, 2009 - According to the IT Policy Compliance Group's research report, spending on legal data custody for legal settlements, legal expenses, & costs in IT to find, produce, protect, and preserve information is between 75 and 94 percent lower for firms with the best practices. This report documents which practices are reducing costs and improving results.
Information Management: The First Step in the Right Direction by Symantec Corporation. March 16, 2011 - This white paper from Symantec Corporation takes an in-depth look into some of the information management strategies companies are using today, and the inefficiencies inherent in them. Read on to learn more about what your company can accomplish in the data center through e-discovery events.
Information Retention and eDiscovery Survey by Symantec Corporation. October 17, 2011 - This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Integrated Backup vs. Traditional Disk Libraries by Symantec Corporation. June 11, 2012 - This expert e-guide explores how new integrated backup appliances are being considered an option to traditional disk libraries and other products available today. Read now to learn more.
Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript by Symantec Corporation. September 30, 2010 - Check out this presentation transcript to learn about an archiving solution that allows businesses to efficiently manage the increasing costs associated with storage growth, compliance and litigation.
IT Budget Strategy in a Down Economy: Stop Buying Storage! by Symantec Corporation. January 15, 2009 - With the current downturn in today's economy, organizations are reluctant to spend any more money than absolutely necessary. Read this paper to learn how Symantec is uniquely able to deliver products and solutions with the immediate ROI that the current financial situation demands.
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by Symantec Corporation. March 13, 2009 - With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
Keep Mobile Shopping Safe: Threats and Solutions by Symantec Corporation. September 13, 2013 - This crucial paper examines the current threats to mobile environments, such as mobile malware, and discusses what steps you can take to ensure that your mobile network is safe against these threats.
Law & The Data Explosion by Symantec Corporation. September 30, 2010 - This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation. August 03, 2009 - Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Leveraging Clustered File System Software to Deliver Superior Application Availability by Symantec Corporation. December 28, 2010 - Transactional application availability is more important than ever to businesses in a globalized economy. This Vendor Spotlight examines the various architectural approaches to ensuring application uptime and availability, particularly a clustered file system approach with clustered services.
Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn by Symantec Corporation. December 14, 2010 - Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Managing SSL Certificates with Ease by Symantec Corporation. October 16, 2013 - Learn some of the most common pitfalls associated with SSL certificate management and how SSL certificate management tools can help keep information confidential and secure.
Mistakes Made When Backup Up VMs & How to Prevent Them by Symantec Corporation. September 07, 2012 - This expert E-Guide can help by outlining the 5 most common mistakes made when backing up VMs and how to avoid them.
Mitigating Risk in a Mobile World by Symantec Corporation. September 05, 2012 - Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Mobile Security Software Keeps Corporate Data Safe by Symantec Corporation. November 20, 2012 - In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection by Symantec Corporation. February 2008 - Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments.
NetBackup Disk Based Data Protection Options by Symantec Corporation. June 2008 - This paper explains the disk options and their capabilities as well as the other new features in NetBackup 6.5 that make up the Enterprise Disk Foundation, also it provides guidance in choosing the appropriate disk options for your environment.
NetBackup Solutions for VMware by Symantec Corporation. March 06, 2009 - It is critical to choose the right data protection solution, one that is complete, one that not only protects the physical world, but is also finely tuned for the virtual world. The current release of NetBackup delivers award winning solutions for VMware.
Next Generation Data Protection with Symantec NetBackup 7 by Symantec Corporation. August 16, 2010 - Read this paper to learn how NetBackup 7 simplifies the protection of your information-driven enterprise by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments.
Next Generation Data Protection with Symantec NetBackup™ 7 by Symantec Corporation. June 24, 2010 - Read this paper to learn how NetBackup 7 simplifies the protection of your information-driven enterprise by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments.
Overcoming Applications Barriers to Windows 7 Migration by Symantec Corporation. January 20, 2011 - This paper outlines the applications barrier to Windows 7 migration, explores alternative ways to resolve it, presents Altiris Deployment Solution, and illustrates its compelling advantages for your Windows 7 migration and beyond.
Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec by Symantec Corporation. January 19, 2011 - Symantec can help you meet the migration challenge—and capture the opportunity. Read this overview to learn more.
PassMark Report: Enterprise Endpoint Security Performance Benchmarks by Symantec Corporation. November 30, 2012 - This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.
PassMark Success: Endpoint Protection by Symantec Corporation. April 10, 2013 - Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Ponemon Study: 2011 Cost of a Data Breach by Symantec Corporation. March 31, 2012 - This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Presentation Transcript: Backup and Archive Are Not the Same Thing! by Symantec Corporation. September 28, 2009 - Discover some of the challenges you'll face when compliance mandates a retention policy that just doesn’t make sense, and learn about some alternate solutions to backup and archiving you may not have considered yet.
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise by Symantec Corporation. May 06, 2009 - This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management by Symantec Corporation. June 29, 2009 - Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.
Presentation Transcript: Getting Set for e-Discovery by Symantec Corporation. November 06, 2009 - In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World by Symantec Corporation. June 04, 2012 - Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries.
Presentation Transcript: The Other Green - Storage Efficiency and Optimization by Symantec Corporation. September 25, 2009 - This session will look at various techniques and strategies to optimize either on-line active or primary as well as near-line or secondary storage environment during tough economic times, as well as to position for future growth, after all, there is no such thing as a data recession!
Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by Symantec Corporation. June 08, 2012 - In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.
Presentation Transcript: Understanding Dedupe by Symantec Corporation. August 10, 2010 - Access this presentation transcript, brought to you by SearchStorage.com, to develop a better understanding of data deduplication from one of the world’s leading experts on deduplication – W. Curtis Preston.
Protecting Your Website With Always On SSL by Symantec Corporation. May 01, 2012 - This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Put Data Growth in Its Place by Symantec Corporation. November 15, 2010 - It’s a fact: Information–both its availability and accessibility–is critical for the success of any business in a 21st Century economy. Yet most IT organizations are not organized around information, but around infrastructure of servers, storage, and applications. We are entering perilous times for data. Read this white paper to learn more.
Reducing the Cost and Complexity of Web Vulnerability Management by Symantec Corporation. December 31, 2012 - Read this white paper for an explanation on why web vulnerability assessments are necessary, and provide extra security for your customers.
SANS 2013 Critical Security Controls Survey: Moving from Awareness to Action by Symantec Corporation. October 25, 2013 - In this analyst report by SANS, see how enterprises are adapting to government-created Critical Security Controls (CSCs) to enhance their security posture and effectively mitigate advanced threats.
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by Symantec Corporation. October 17, 2013 - Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
Securing Data, Not Endpoints: The Best Way to Control Consumerization by Symantec Corporation. November 27, 2012 - Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Securing the Cloud for the Enterprise by Symantec Corporation. September 22, 2011 - Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.
Security as a Service: Benefits and Risks of Cloud-Based Security by Symantec Corporation. March 01, 2013 - Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation. March 08, 2011 - The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today.
Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation. March 08, 2011 - The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today.
Simplify SSL Certificate Management Across the Enterprise by Symantec Corporation. May 07, 2012 - Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Simplify Your Relationship with Endpoint Security by Symantec Corporation. December 07, 2011 - View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Six Email Security Best Practices for Email SaaS by Symantec Corporation. December 03, 2012 - Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them by Symantec Corporation. April 30, 2013 - This comprehensive white paper explores six threats to your website and provides a solution for how you can prevent them.
SMB Backup: Choosing the Best Solution by Symantec Corporation. May 01, 2012 - This latest Storage Magazine column by Lauren Whitehouse explores how to choose the best SMB backup solution, products in this space, and why disk backup is a good backup solution for SMBs. Also learn the top 5 tips for virtual server backup.
SMB cookbook: Whipping up a virtualization disaster recovery plan by Symantec Corporation. May 14, 2013 - This exclusive E-Guide explores how to implement a successful virtualization DR plan for the growing needs and shrinking budgets of today's IT departments.
SMB Snapshot Cardiac and Vascular Institute by Symantec Corporation. October 29, 2013 - This one page paper explores how one company easily and affordably implemented a cloud backup and recovery solution that provides simple DR, secure backups of sensitive data and ease of implementation. Read on to learn more.
SSL Certificate Management: Avoiding Common Mistakes by Symantec Corporation. October 11, 2013 - This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
SSL Certificate Management: Avoiding Common Mistakes by Symantec Corporation. December 05, 2013 - Errors are bound to occur when SSL certificate management is handled manually. This expert e-guide explores SSL challenges and breaks down effective ways to overcome them.
SSL Certificate Management: Common Mistakes and How to Avoid Them by Symantec Corporation. October 18, 2013 - Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
State of the Data Center Survey by Symantec Corporation. May 31, 2013 - Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.
Stuxnet 0.5: The Missing Link by Symantec Corporation. October 28, 2013 - In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Symantec 2010 SMB Information Protection Survey by Symantec Corporation. November 29, 2010 - Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.
Symantec 2011 SMB Disaster Preparedness Survey by Symantec Corporation. January 21, 2011 - For the second year, Symantec’s SMB Disaster Preparedness Survey revealed that SMBs are not taking disaster preparedness for their computer and networking systems as seriously as they should. Read this survey and analysis to learn more.
Symantec 2011 SMB Disaster Preparedness Survey by Symantec Corporation. November 22, 2011 - This white paper features the results of Symantec's second SMB disaster preparedness survey, and provides recommendations to help your organization establish and maintain a successful disaster recovery strategy.
Symantec 2013 Internet Security Threat Report by Symantec Corporation. April 30, 2013 - This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Symantec Backup Exec - Superior Protection for Virtual Environments by Symantec Corporation. April 30, 2012 - This 1-page resource reveals how Symantec Backup Exec 2012 with V-Ray technology delivers superior backup and recovery for VMware and Microsoft Hyper-V as well as a host of features unmatched by competitive products. Read now to learn more.
Symantec Backup Exec 2012 V-Ray Edition by Symantec Corporation. December 31, 2012 - This informative paper examines a backup and recovery software solution built for companies that have virtualized their environments. Discover how this technology can help you achieve unmatched backup and recovery, deduplication everywhere, victory over complexity and much more. Read on now to learn more.
Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server by Symantec Corporation. February 2008 - Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Symantec Backup Exec™ System Recovery 7.0 by Symantec Corporation. August 01, 2007 - Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations.
Symantec Backup Exec System Recovery 8: The Gold Standard in Complete Windows System Recovery by Symantec Corporation. March 2008 - Symantec Backup Exec System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.
Symantec CEO: "We'll Win in Virtual Backup and the Cloud" by Symantec Corporation. June 11, 2012 - In this interview with SearchDataBackup.com, Symantec CEO Enrique Salem explores the cloud’s role in modern backup and why he expects backup appliances will eventually make up the bulk of backup implementations. Read now to learn more.
Symantec Endpoint Protection 11.0.3 by Symantec Corporation. March 2009 - In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
Symantec Endpoint Protection 12 by Symantec Corporation. May 26, 2011 - Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Symantec Endpoint Protection Small Business Edition 12 by Symantec Corporation. May 26, 2011 - Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Symantec Enterprise Vault by Symantec Corporation. December 30, 2011 - Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.
Symantec Enterprise Vault for Microsoft Office SharePoint Server by Symantec Corporation. November 08, 2010 - Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience
Symantec Intelligence Report - August 2013 by Symantec Corporation. August 31, 2013 - In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Symantec Intelligence Report - June 2013 by Symantec Corporation. June 28, 2013 - This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Symantec Intelligence Report – May 2013 by Symantec Corporation. May 31, 2013 - Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Symantec Intelligent Data Management by Symantec Corporation. October 12, 2010 - In this Resource Center learn more about a pre-integrated and validated end-to-end storage and data archiving solution. Symantec's archiving solution running on Dell's fully scalable and easy-to-use object storage offering provides a comprehensive archiving solution designed for compliance, retention and data management needs.
Symantec Internet Security Threat Report by Symantec Corporation. April 01, 2008 - The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Symantec Internet Security Threat Report by Symantec Corporation. March 01, 2007 - This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation. April 01, 2009 - This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Symantec Internet Security Threat Report: Trends for 2011 by Symantec Corporation. April 30, 2012 - This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Symantec Internet Security Threat Report: Trends for July-December 07 by Symantec Corporation. June 2008 - This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Symantec IT Compliance Solution by Symantec Corporation. March 2009 - Symantec helps organizations reduce compliance costs by automating key
IT compliance processes, including policy management, controls assessment,
monitoring, remediation, and reporting. Check out this brochure to learn more.
Symantec Mail Security for SMTP by Symantec Corporation. May 14, 2007 - Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Symantec NetBackup 5000 Appliance: Turnkey Deduplication Solution for the Enterprise by Symantec Corporation. December 28, 2010 - Most IT organizations today are challenged with the problem of rapid data growth. Read this white paper to find the right data management solution for your organization.
Symantec NetBackup, Cisco UCS, and VMware vSphere Joint Backup Performance Benchmark by Symantec Corporation. December 28, 2010 - Obtaining the best possible backup performance is always a team effort in the sense that multiple technologies are brought together to provide optimal data protection performance. Read this white paper to learn why the components described in this document will help you to protect your valuable virtual machine environment.
Symantec Protection Network and Online Backup: An Executive Overview by Symantec Corporation. February 2008 - In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.
Symantec Protection Suite Challenge by Symantec Corporation. July 28, 2009 - Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Symantec Protection Suite Enterprise Edition by Symantec Corporation. June 18, 2009 - Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Symantec Report on Rogue Security Software by Symantec Corporation. October 01, 2009 - The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Symantec SMB Threat Awareness Poll by Symantec Corporation. November 22, 2011 - Symantec conducted its SMB Threat Awareness Poll in September 2011, asking 1,900 SMBs how familiar they are with threats, and what they are doing to protect themselves. This white paper features the results of this survey, and provides best practices and recommendations to help your organization's data stay secure. Read on to learn more.
Symantec Vision 2012: 4 Highlights by Symantec Corporation. June 11, 2012 - This year’s annual Symantec Vision conference in Las Vegas offered focus groups, interactive labs, opportunities for certification and one-on-one sessions with Symantec software experts. Check out this brief E-Guide to learn the specific highlights and announcements made at this event.
Symantec Web Gateway 5.0 Trialware by Symantec Corporation. July 10, 2012 - In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.
Symantec Website Security Threat Report by Symantec Corporation. September 09, 2013 - This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Symantec's 7 Steps to Windows 7: Planning and Assessment - Presentation Transcript by Symantec Corporation. December 13, 2010 - With the release of Windows 7, many organizations are considering migrating to this new platform. This transcript explores best practices to aid IT pros in this transition. Discover a wide range of hardware and software technology that will help you prepare for this switch.
System Recovery-Breaking through the Dissimilar Hardware Restore Challenge by Symantec Corporation. March 2008 - This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
Tackling SSL Vulnerabilities for Secure Online Transactions by Symantec Corporation. October 16, 2013 - As internet commerce continues to grow in leaps and bounds, so too does the type and sophistication of cyber-attacks. This expert E-Guide takes a detailed look at recent security breaches and examines the steps that businesses must take to protect themselves and their customers.
Taking the Leap to Virtualization by Symantec Corporation. December 30, 2011 - This short white paper explores key questions you need to ask as you migrate to the virtualized environment to ensure your data remains safe and that you are able to fully reap the benefits that virtualization offers. Read now to learn more.
Targeted attacks: Preparation and Mitigation by Symantec Corporation. May 17, 2013 - This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
The Dangers of Unsecured Wi-Fi by Symantec Corporation. September 11, 2013 - This crucial white paper examines the security issues that unsecured Wi-Fi brings and details what steps you can take to minimize risks and safeguard both your connections and your sensitive information.
The Forrester Wave™: Endpoint Security, Q1 2013 by Symantec Corporation. January 04, 2013 - This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.
The hidden costs of self-signed SSL certificates by Symantec Corporation. December 31, 2012 - This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor.
The Hidden Costs of Self-Signed SSL Certificates by Symantec Corporation. May 09, 2012 - Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor.
The Pros and Cons of SSL Decryption for Enterprise Network Monitoring by Symantec Corporation. October 17, 2013 - SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
The Time for VM-Only Backup Technology Has Passed by Symantec Corporation. May 31, 2012 - This white paper reveals how you can adopt a unified backup solution that eliminates the cumbersome process of cobbling together tools from multiple vendors for VMware backup, Hyper-V, the physical hosts they run on, the backup of the backup server, and deduplication. Read now to learn more.
The Virtualization Squad: Backup Exec – 2 Minute Preview VIDEO by Symantec Corporation. October 25, 2013 - This short video explores a backup and data protection solution built for today's virtualized IT. Watch now to discover the benefits this industry-leading technology provides.
Tiered Storage Tutorial by Symantec Corporation. December 21, 2010 - Recent technology improvements aiding the success of tiered storage include new solid-state disks (SSDs), improved Serial Attached SCSI (SAS) and more efficient data movement, classification and quality of service (QoS) software. Continue reading this tutorial to learn more.
Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10 by Symantec Corporation. December 30, 2011 - This short white paper lists the top 10 reasons to archive information with Symantec Enterprise Vault 10. Read now to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.
Top 5 Strategies for Getting an Email Archiving Project off the Ground by Symantec Corporation. December 30, 2011 - This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Top Benefits of Symantec Protection Suite by Symantec Corporation. June 09, 2009 - Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Top Five Strategies for Getting an Email Archiving Project off the Ground by Symantec Corporation. January 15, 2008 - Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of
an email archiving system.
Top Five Ways to Improve E-Discovery with Archiving by Symantec Corporation. January 21, 2008 - Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Top Reasons to Upgrade to Symantec Backup Exec 12.5 and Backup Exec System Recovery 8.5 by Symantec Corporation. October 2008 - Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection by Symantec Corporation. July 05, 2012 - The owner of Treehouse in the Glen had found himself spread too thin trying to manage his toy business and the mix of security products they had implemented. In this case study, uncover how he was able to reduce the time spent on managing information security, defend against virus outbreaks and enable faster system performance.
Understanding Consumer Device Management and BYOD by Symantec Corporation. November 28, 2012 - This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Understanding What your Endpoint Security Policy Needs by Symantec Corporation. November 22, 2013 - Access this e-guide for tips to determine whether antivirus alternatives should be brought to your network. Uncover what the future of endpoint antimalware holds, as well as how to detect hostile endpoints.
Veritas Cluster Server from Symantec by Symantec Corporation. October 31, 2012 - This resource discusses a cluster server platform that ensures high availability and disaster recovery for the most critical applications.
Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies by Symantec Corporation. February 2008 - This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage is used cost-effectively while still maintaining appropriate levels of
Veritas NetBackup for Microsoft Exchange Server Solution Guide by Symantec Corporation. - Upon completion of reading this paper, the reader should be well positioned to describe available data protection solutions for Microsoft Exchange as provided by NetBackup, the NetBackup for Exchange Server agent, and the NetBackup Snapshot Client.
Veritas NetBackup 6.5 for VMware 3.x: Best Practices by Symantec Corporation. November 2007 - This paper covers best practices for designing solutions for--and protecting--VMware virtual machines.
Virtual Data Center eZine: Backup Strategies for Virtual Servers by Symantec Corporation. June 30, 2010 - This exclusive E-Zine explores some of the challenges surrounding virtualization and how to overcome them. Find out about the various backup strategies for virtual servers, building a private cloud and how to gauge server resources for endpoint virtualization.
Virtual Machine Backup Strategies for Optimal Business Continuity by Symantec Corporation. May 14, 2013 - This expert E-Guide provides insight into how optimal virtual machine and virtual server backup strategies are key for optimal business continuity.
Virtual Machine Protection with Symantec NetBackup 7 by Symantec Corporation. November 15, 2010 - Because of the obvious total cost of ownership benefits of virtualization, virtual machines are assuming more business-critical roles in the data center. In a recent survey, more than 75% of all enterprise companies listed server virtualization as one of the top technologies they are adopting. Read this white paper to learn more.
Virtual Server Backup Software: Best Practices for the Data Center by Symantec Corporation. February 22, 2013 - In this E-Guide from SearchDataCenter.com, we explore the differences between physical server and virtual server backups to help you better evaluate available tools and choose the best solution for your enterprise's needs.
Virtualization and Evolution to the Cloud Survey by Symantec Corporation. July 26, 2011 - The 2011 Virtualization and Evolution to the Cloud Survey explores the goals, attitudes, challenges and experiences of large enterprises around the world as they stand on the brink of moving business-critical applications to virtualized and hybrid cloud environments.
Virtualization Data Protection by Symantec Corporation. October 25, 2013 - This interactive eBook explores some best practices, business considerations and practical answers to better manage and protect your data in virtualized environments. Read on now to learn more.
Virtualizing Business-Critical Applications with Confidence by Symantec Corporation. March 08, 2011 - This technical white paper from Symantec Corporation looks at the advantages associated with adopting a VMWare environment in organizations.
Virtualizing Business-Critical Applications With Confidence by Symantec Corporation. December 27, 2010 - Within any business, a number of applications exist that are critical to the success of the business. As a result, these applications and the systems they run on require a higher level of availability. The trade off with increasing application availability is an additional cost in terms of redundant hardware and complexity.
Virtualizing Business-Critical Applications With Confidence by Symantec Corporation. November 15, 2010 - Within any business, a number of applications exist that are critical to the success of the business. As a result, these applications and the systems they run on require a higher level of availability. The trade off with increasing application availability is an additional cost in terms of redundant hardware and complexity.
Vulnerability Assessment by Symantec Corporation. October 14, 2013 - Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation. February 08, 2013 - This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Web Application Firewalls: Patching, SDLC Key for Security, Compliance by Symantec Corporation. February 11, 2013 - In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Web Based Attacks by Symantec Corporation. February 01, 2009 - This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Web Browser Security Features Make Attacks Harder by Symantec Corporation. February 11, 2013 - In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Web-Facing Applications: Mitigating Likely Web Application Threats by Symantec Corporation. February 11, 2013 - In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Website Security Threat Report, Part Two by Symantec Corporation. October 11, 2013 - This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
What to Look For in a Data Protection Solution for Virtual Environments - Data Sheet by Symantec Corporation. September 30, 2012 - This three page white paper provides you with four "must have" features to consider ensuring your backup and recovery solution provides the best data and system protection for any virtual environment.
What's New in Symantec Data Loss Prevention by Symantec Corporation. April 05, 2013 - This resource demonstrates how organizations can expand the reach of their security teams with improved data loss prevention offering advanced reporting, improved usability and new security integrations.
When Good Backups Go Bad: Data Recovery Failures and What to Do About Them by Symantec Corporation. November 22, 2011 - In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more.
When Good Backups Go Bad: Data Recovery Failures and What to Do About Them by Symantec Corporation. September 20, 2011 - Read this white paper to explore how to make sure your backup and recovery system protects all of your data, all of the time.
White Paper: Cloud, Appliance, or Software: Which Backup Solution Is Best for Your Small or Midsize Organization? by Symantec Corporation. December 31, 2011 - Cloud backup is an alternative to an on-premise software application where both the backup application and information storage reside off-site. This allows you to replace expensive upfront investments in backup hardware, software, and personnel with an affordable monthly or yearly subscription-based service. Read now to learn more.
White Paper: Is Online Backup Right for your Business? 8 Reasons to Consider Protecting Your Data in the Cloud by Symantec Corporation. December 31, 2011 - Without an effective backup strategy in place you could be at risk for financial loss, legal liability and damage to your reputation. This white paper discusses 8 compelling reasons to consider a cloud-based, online approach to backup. Read now to learn more.
Why choose Symantec for Mobile Device Management by Symantec Corporation. June 01, 2012 - In this white paper, learn some of the most important considerations for deploying a mobile device management solution. Additionally, discover key tips for building a successful framework for planning your mobile security strategy.
Why Compliance Pays: Reputations and Revenues at Risk Research Report by Symantec Corporation. March 2009 - Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime.
Your Backup Is Not an Archive by Symantec Corporation. December 27, 2010 - Data growth, budget pressure, rising service-level requirements, and new technologies like virtualization strain the capabilities of traditional backup and recovery processes, but recent advances in data protection and management unlock an optimized strategy. Read on to learn more.
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths by Symantec Corporation. October 16, 2013 - As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.