Symantec Corporation Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Symantec Corporation

Overview: A world leader in Internet security technology and technology solutions that enable corporate organizations to manage the cost of ownership associated with supporting and servicing users of laptop computers and other mobile devices.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Symantec Corporation.
Research offered by Symantec Corporation

2010 Annual Study: U.S. Enterprise Encryption Trends by Symantec Corporation. December 03, 2010 - This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.

  View 2010 Annual Study: U.S. Enterprise Encryption Trends research abstract

2010 SMB Information Protection Survey by Symantec by Symantec Corporation. June 23, 2010 - This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.

  View 2010 SMB Information Protection Survey by Symantec research abstract

2012 - Endpoint Security Best Practices Survey by Symantec Corporation. September 06, 2012 - Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  View 2012 - Endpoint Security Best Practices Survey research abstract

2012 Endpoint Security Best Practices Survey by Symantec Corporation. June 29, 2012 - Today’s SMBs are increasingly forced to invest in new measures to protect their endpoints and their business from cyber threats. This resource explores key findings from the Symantec 2012 Endpoint Security Survey and offers best practices and recommendations for reducing the risk of a successful cyber attack.

  View 2012 Endpoint Security Best Practices Survey research abstract

2012 Endpoint Security Best Practices Survey Results by Symantec Corporation. April 08, 2013 - This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.

  View 2012 Endpoint Security Best Practices Survey Results research abstract

5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know by Symantec Corporation. June 11, 2009 - Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.

  View 5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know research abstract

6 Steps to Prevent a Data Breach by Symantec Corporation. September 03, 2009 - Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches.

  View 6 Steps to Prevent a Data Breach research abstract

7 Requirements of Data Loss Prevention by Symantec Corporation. March 2009 - This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.

  View 7 Requirements of Data Loss Prevention research abstract

8 Questions to Ask Before Moving to the Cloud by Symantec Corporation. March 01, 2013 - Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.

  View 8 Questions to Ask Before Moving to the Cloud research abstract

8 Reasons to Upgrade to Symantec NetBackup 7.6 by Symantec Corporation. December 30, 2013 - As organizations continue to adapt and adjust to the virtual world, traditional backup and recovery solutions simple no longer fit the bill. Explore this informational white paper to find out what this new backup solution offers.

  View 8 Reasons to Upgrade to Symantec NetBackup 7.6 research abstract

A Backup Solution Made to Support Your Virtual Machines by Symantec Corporation. December 30, 2013 - As organizations continue to adapt and adjust to the virtual world, traditional backup and recovery solutions simply no longer fit the bill. Explore this informational white paper to find out what this new backup solution offers.

  View A Backup Solution Made to Support Your Virtual Machines research abstract

A Candid Examination of Data Deduplication by Symantec Corporation. August 26, 2009 - This DCIG analyst report will provide a detailed look at the benefits, primary role and implementation methods of data deduplication.

  View A Candid Examination of Data Deduplication research abstract

A Candid Examination of Data Deduplication by Symantec Corporation. August 11, 2009 - Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available.

  View A Candid Examination of Data Deduplication research abstract

About to Buy Guide: Mobile Device Management Software by Symantec Corporation. March 30, 2012 - Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.

  View About to Buy Guide: Mobile Device Management Software research abstract

Accelerate Your Success Through Virtualization by Symantec Corporation. September 12, 2013 - Check out this exclusive resource to find out the virtualization best practices so you can make sure your move to a virtualized environment doesn't risk the safety and security of your organization and its data.

  View Accelerate Your Success Through Virtualization research abstract

Agent based vs host based virtualization backups: has the market shifted? by Symantec Corporation. May 13, 2013 - This E-Guide provides insight into the evolution of data protection for virtual environments and reveals how host-based virtualization backups used to be king, but agent-based approaches are now catching on.

  View Agent based vs host based virtualization backups: has the market shifted? research abstract

Agent vs Agentless VM Backup and Recovery - Data Sheet by Symantec Corporation. October 31, 2012 - This brief paper condenses the confusion of what a backup agent is or does with unbiased information so you can make the right choice for your environment. Check out each method now highlighting the pros and cons of each so you can make informed decisions without any distractions.

  View Agent vs Agentless VM Backup and Recovery - Data Sheet research abstract

Altering IT Capabilities with Solid-State Storage by Symantec Corporation. March 27, 2014 - This white paper identifies 4 major challenges with solid-state storage implementation, and Taneja Group offers recommendations for tackling these challenges.

  View Altering IT Capabilities with Solid-State Storage research abstract

American Equipment, Symantec Technologies and Wasatch Software Success by Symantec Corporation. July 05, 2012 - Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.

  View American Equipment, Symantec Technologies and Wasatch Software Success research abstract

Anatomy of a Data Breach - Why Breaches Happen and What to Do About It by Symantec Corporation. August 18, 2010 - This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.

  View Anatomy of a Data Breach - Why Breaches Happen and What to Do About It research abstract

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It by Symantec Corporation. August 10, 2009 - This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.

  View Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It research abstract

Archiving in the Cloud: Essential Tips and Questions to Answer by Symantec Corporation. November 20, 2012 - Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.

  View Archiving in the Cloud: Essential Tips and Questions to Answer research abstract

Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments by Symantec Corporation. February 28, 2013 - This white paper discusses what to look for in a virtualization protection solution and explores the features and benefits of both separate and unified solutions for protecting the virtual components of a modern infrastructure. Read on to discover the total cost of ownership of these two types of solutions and learn the ins and outs of each.

  View Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments research abstract

Attacks on Point of Sales Systems by Symantec Corporation. March 11, 2014 - Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.

  View Attacks on Point of Sales Systems research abstract

Backup Exec 2010: Archiving Options by Symantec Corporation. July 15, 2010 - Symantec makes it easier for companies of all sizes to store, manage, protect, and discover Exchange and Windows file servers, with Backup Exec’s new Archiving Options, powered by market-leading Symantec Enterprise Vault. Learn and explore Backup Exec 2010 Archiving Options in this insightful white paper.

  View Backup Exec 2010: Archiving Options research abstract

Backup Exec 2010: Deduplication Option by Symantec Corporation. June 24, 2010 - Data deduplication offers companies the opportunity to dramatically reduce the amount of storage required for backups and to more efficiently centralize backup data from multiple sites for assured disaster recovery. This paper discusses Backup Exec 2010 which now includes integrated deduplication capabilities.

  View Backup Exec 2010: Deduplication Option research abstract

Backup Exec 2010: Protect More, Store Less, Save More by Symantec Corporation. June 24, 2010 - Would you like to improve your backup performance while reducing storage costs? Join this webcast to learn how to easily eliminate excess storage consumption with ease through integrated deduplication and archiving technology introduced in Symantec Backup Exec 2010.

  View Backup Exec 2010: Protect More, Store Less, Save More research abstract

Best and worst practices for email archiving in Exchange Server by Symantec Corporation. September 09, 2011 - Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.

  View Best and worst practices for email archiving in Exchange Server research abstract

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation. January 05, 2009 - Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol.

  View Best Practice for NDMP Backup Veritas NetBackup research abstract

Best Practices for Archiving Lotus Domino Environments by Symantec Corporation. March 2008 - This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.

  View Best Practices for Archiving Lotus Domino Environments research abstract

Best Practices for Backup and Recovery by Symantec Corporation. June 2008 - Check out this Symantec webcast discussing best practices for backup and recovery

  View Best Practices for Backup and Recovery research abstract

Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery by Symantec Corporation. November 18, 2010 - The benefits of server virtualization are becoming so well-known that it has become a mandate in many organizations to virtualize all new application servers. But a barrier that is sometimes invisible to enterprises is how to best manage their virtual servers teams and which of their responsibilities, should be centralized. Read on to learn more.

  View Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery research abstract

Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery by Symantec Corporation. December 27, 2010 - The benefits of server virtualization are becoming so well-known that it has become a mandate in many organizations to virtualize all new application servers. But a barrier that is sometimes invisible to enterprises is how to best manage their virtual servers teams and which of their responsibilities, should be centralized. Read on to learn more.

  View Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery research abstract

Best Practices for Defining and Establishing Effective Archive Retention Policies by Symantec Corporation. June 30, 2007 - Electronically stored information (ESI) has become a major source of business records, and any organization that uses ESI - from email to word processing to instant messaging - must manage those records. This paper explains best practices for establishing effective archive retention policies.

  View Best Practices for Defining and Establishing Effective Archive Retention Policies research abstract

Best Practices for Endpoint Data Loss Prevention by Symantec Corporation. September 2008 - Find out the best practices for planning for and deploying an endpoint DLP tool in your corporation. The technology overview section of this document provides a closer look on how DLP works with other existing technologies and how best to integrate DLP in your environment.

  View Best Practices for Endpoint Data Loss Prevention research abstract

Best Practices for Protecting Microsoft Exchange by Symantec Corporation. March 23, 2006 - The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.

  View Best Practices for Protecting Microsoft Exchange research abstract

Best Practices for Windows Vista Planning, Migration, and Ongoing Management by Symantec Corporation. March 2008 - It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.

  View Best Practices for Windows Vista Planning, Migration, and Ongoing Management research abstract

Best Practices: Backing Up VMware with Veritas NetBackup by Symantec Corporation. January 01, 2009 - As there are many ways of using VMware technology, there are just as many methods available for protecting this innovative technology. System administrators and IT technologists can use this paper to determine one of three recommended solutions for protecting VMs. Each of these technologies has relative advantages and disadvantages.

  View Best Practices: Backing Up VMware with Veritas NetBackup research abstract

Bringing the Network Perimeter Back From the 'Dead' by Symantec Corporation. December 03, 2012 - There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.

  View Bringing the Network Perimeter Back From the 'Dead' research abstract

Building the Business Case for Integrated Backup Appliances by Symantec Corporation. February 14, 2014 - This white paper addresses the benefit of investing in an all-in-one backup appliance to cut costs while reducing management overhead and complexity.

  View Building the Business Case for Integrated Backup Appliances research abstract

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation. March 2009 - As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.

  View Business Value Analysis Study: Citizens Business Bank research abstract

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense by Symantec Corporation. February 28, 2013 - BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.

  View BYOD Platform Support: Why an iOS/Android Strategy Makes Sense research abstract

BYOD Policy Creation Tips from Gartner by Symantec Corporation. November 27, 2012 - This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.

  View BYOD Policy Creation Tips from Gartner research abstract

BYOD Security Policy Considerations and Best Practices by Symantec Corporation. November 26, 2012 - This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  View BYOD Security Policy Considerations and Best Practices research abstract

BYOD Security Policy, not MDM, at Heart of Smartphone Security by Symantec Corporation. May 14, 2013 - This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.

  View BYOD Security Policy, not MDM, at Heart of Smartphone Security research abstract

Choosing Linux as a Strategic Platform by Symantec Corporation. December 27, 2010 - This Technology Spotlight discusses the growth of Linux as a strategic platform for enterprises as well as the evolving uses of Linux and its benefits. The paper also looks at the role of Symantec in this important market.

  View Choosing Linux as a Strategic Platform research abstract

Cloud Backup Versus Cloud Storage Comparison by Symantec Corporation. December 05, 2012 - This exclusive SearchStorage.com E-Guide takes a close and clear look at cloud storage and backup so you can arm yourself with the correct facts. Check it out now for a comparison of cloud backup, cloud storage and storage in the cloud, and learn how to differentiate between cloud backup, recovery and restore.

  View Cloud Backup Versus Cloud Storage Comparison research abstract

Cloud Backup: Terms and Trends by Symantec Corporation. May 14, 2013 - This expert E-Guide recaps the results of a recent cloud backup survey and reports on your peers' experiences and satisfaction with it. It also examines how cloud backup fits into the broader cloud storage ecosystem and clears up some confusion around semantics.

  View Cloud Backup: Terms and Trends research abstract

Cloud Disaster Recovery: Practical Applications and Pointers for the SMB by Symantec Corporation. May 24, 2013 - This expert guide from SearchStorage.com discusses how cloud-based services can simplify and streamline your disaster recovery and outlines key phases of the DR planning process.

  View Cloud Disaster Recovery: Practical Applications and Pointers for the SMB research abstract

Cloud Endpoint Security: Considerations for Cloud Security Services by Symantec Corporation. February 26, 2013 - This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!

  View Cloud Endpoint Security: Considerations for Cloud Security Services research abstract

Cloud Endpoint Security: Considerations for Cloud Security Services by Symantec Corporation. May 17, 2013 - This e-guide from our experts at SearchSecurity.com will share some important information you should know about cloud-enabled security offerings, including the benefits of a cloud-based console and the factors you need to consider when evaluating products.

  View Cloud Endpoint Security: Considerations for Cloud Security Services research abstract

Cloud Storage: Specific Use Cases and Ground Rules for Getting Started by Symantec Corporation. May 24, 2013 - This expert guide from SearchCloudStorage.com examines recommended use cases for cloud storage applications, including backup, replication and content distribution. Read on and also learn what concerns you should address before you get started.

  View Cloud Storage: Specific Use Cases and Ground Rules for Getting Started research abstract

Cloud-Based Email Archiving Pros and Cons by Symantec Corporation. December 03, 2012 - Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest.

  View Cloud-Based Email Archiving Pros and Cons research abstract

Comparing Email Archiving Software with General Archiving Software by Symantec Corporation. November 20, 2012 - Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.

  View Comparing Email Archiving Software with General Archiving Software research abstract

Comprehensive SQL Server Data Protection with Symantec Backup Exec 11d by Symantec Corporation. March 2008 - Choosing the proper backup and recovery plan for SQL Server can be a daunting task. Read this white paper and learn which model best suits your organization and can ease administration.

  View Comprehensive SQL Server Data Protection with Symantec Backup Exec 11d research abstract

Considering a BYOPC Strategy by Symantec Corporation. November 20, 2012 - Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.

  View Considering a BYOPC Strategy research abstract

Control Compliance Suite Trialware by Symantec Corporation. April 01, 2009 - Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  View Control Compliance Suite Trialware research abstract

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation. July 15, 2010 - By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story.

  View Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec research abstract

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation. August 31, 2010 - This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business.

  View Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions research abstract

Data Deduplication Technology Tutorial: A guide to data deduping and backup by Symantec Corporation. August 16, 2010 - This data deduplication technology tutorial will look at all of the data dedupe alternatives and take a look at some of the most significant deduplication backup products. Learn about global data deduplication, what to look for in a data deduplication product, inline vs. post-processing deduplication, and more.

  View Data Deduplication Technology Tutorial: A guide to data deduping and backup research abstract

Data Loss Prevention Survey by Symantec Corporation. April 02, 2009 - Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.

  View Data Loss Prevention Survey research abstract

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands by Symantec Corporation. October 2008 - Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.

  View Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands research abstract

Deduplication Backup Basics for Small Businesses by Symantec Corporation. December 01, 2011 - Data deduplication is one of the hottest and must-have technologies in the storage world today. For companies that haven't yet implemented dedupe into their backup systems, the interest is growing. Read this expert E-Guide to learn the dedupe backup basics for small businesses.

  View Deduplication Backup Basics for Small Businesses research abstract

Defending Systems on a Wide-open Network with Symantec Endpoint Protection by Symantec Corporation. July 02, 2012 - Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.

  View Defending Systems on a Wide-open Network with Symantec Endpoint Protection research abstract

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD by Symantec Corporation. November 30, 2012 - BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  View Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD research abstract

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection by Symantec Corporation. March 16, 2009 - According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions.

  View DLP Content Discovery: Best Practices for Stored Data Discovery and Protection research abstract

Domino Security Vulnerabilities to Watch For by Symantec Corporation. December 04, 2012 - Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.

  View Domino Security Vulnerabilities to Watch For research abstract

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by Symantec Corporation. October 24, 2013 - Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.

  View Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It research abstract

Don't Wait Until It's Too Late: Backup to the Cloud to Protect Your Business from Disaster by Symantec Corporation. September 30, 2011 - Access this white paper to learn how cloud-based backup is a compelling alternative to hardware solutions and on-premise software to protect data in case of severe computer or network outage.

  View Don't Wait Until It's Too Late: Backup to the Cloud to Protect Your Business from Disaster research abstract

Dynamic Storage Tiering Options by Symantec Corporation. March 13, 2014 - This expert e-guide explains the various dynamic storage tiering product categories and which would be most beneficial for your environment.

  View Dynamic Storage Tiering Options research abstract

e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff by Symantec Corporation. May 2008 - This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.

  View e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff research abstract

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process by Symantec Corporation. June 2008 - The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.

  View e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process research abstract

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation. July 2008 - This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.

  View e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk research abstract

e-Book: Chapter 5 - Understanding the Data Collection Process by Symantec Corporation. August 2008 - Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.

  View e-Book: Chapter 5 - Understanding the Data Collection Process research abstract

e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards by Symantec Corporation. August 2008 - This paper explains Ten hidden e-discovery hazards reviewing everything from databases and storage to instant messages and smartphones which can help ward off e-discovery surprises.

  View e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards research abstract

E-Book: Storage for PACS by Symantec Corporation. December 29, 2010 - The exciting world of PACS in Healthcare IT is ever-changing and can be confusing, but the rewards are immense once these new technologies are implemented. Check out this informative E-book to learn more about emerging technologies like PACS storage needs, image exchange, and transforming your workstations into imaging hubs.

  View E-Book: Storage for PACS research abstract

E-Discovery Cloud Considerations by Symantec Corporation. December 04, 2012 - In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

  View E-Discovery Cloud Considerations research abstract

E-Guide: Backing up Your Virtual Server by Symantec Corporation. December 06, 2010 - Backing up virtual machines is tougher than you think; and the fact of the matter is it’s not a straightforward process! This guide will walk you through how to determine which method is best for your storage requirement.

  View E-Guide: Backing up Your Virtual Server research abstract

E-Guide: Choosing a Data Archiving Strategy: Disk, Tape or Both? by Symantec Corporation. September 16, 2011 - Today’s organizations typically have three data archiving strategies they can choose from: disk archiving, tape archiving or a combination of both. This SearchDataBackup.com E-Guide offers insight into the advantages and disadvantages of each method, how to choose the best approach, and  the best and worst practices of data archives.

  View E-Guide: Choosing a Data Archiving Strategy: Disk, Tape or Both? research abstract

E-Guide: Climbing the Uphill Battle of Exponential Data Growth by Symantec Corporation. December 06, 2010 - This guide provides a simple yet reliable approach to securing data for the long term though the efficient optimization of IT resources and a set of straightforward best practices for data protection. Learn archiving best practices, how to choose a data archiving tool, and how to put together the best data archiving strategy for your business.

  View E-Guide: Climbing the Uphill Battle of Exponential Data Growth research abstract

E-Guide: How to secure virtual environments: 3 things to keep in mind by Symantec Corporation. October 20, 2011 - In order for virtualization administrators to achieve their prime goal, securing their virtual environment, they must carefully plan and execute an effective strategy. Access this expert e-guide to learn three crucial considerations for virtualization security and discover how to avoid common security issues.

  View E-Guide: How to secure virtual environments: 3 things to keep in mind research abstract

E-Guide: Improving Storage Efficiencies in your Storage Environment by Symantec Corporation. December 21, 2010 - Storage efficiency is the ability to store and manage data that consumes the least amount of space with little to no impact on performance. Download this guide for tips on evaluating your data storage efficiency and learn how to increase overall efficiency in your enterprise storage environment.

  View E-Guide: Improving Storage Efficiencies in your Storage Environment research abstract

E-guide: Top Tips for Today’s Archiver by Symantec Corporation. October 19, 2011 - Check out this E-Guide from SearchDataBackup.com to learn how to choose a data archiving strategy and if using tape or disk is the best archiving method for your business. Also learn other archiving best practices to keep in mind.

  View E-guide: Top Tips for Today’s Archiver research abstract

E-Guide: When do You Archive? When do You Backup? by Symantec Corporation. October 19, 2011 - Backups aren’t archives and archives aren’t backups. So how exactly do you differentiate the between the two? This SearchDataBackup.com can help you distinguish these storage technologies from one another by comparing them and outlining how each works. Read on to learn when you should archive and when you should backup.

  View E-Guide: When do You Archive? When do You Backup? research abstract

eBook-- Defining an Email-Archiving Policy by Symantec Corporation. July 09, 2009 - Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

  View eBook-- Defining an Email-Archiving Policy research abstract

eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity by Symantec Corporation. October 01, 2009 - Chapter 4 of this e-book gives advice on determining your email archiving goals and policies to establish a set of system features that match your company’s needs and boost archiving efficiency.

  View eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity research abstract

eGuide: Storage Challenges in Virtualized Server Environments by Symantec Corporation. February 26, 2013 - Access this exclusive, expert E-Guide from SearchVirtualStorage.com to learn about tools and tactics you can leverage to address and solve common storage challenges in virtual server environments, such as efficiency, speed, sprawl and end user expectations.

  View eGuide: Storage Challenges in Virtualized Server Environments research abstract

Eight Reasons to Use One Backup Solution for Virtual and Physical Machines by Symantec Corporation. October 12, 2012 - Utilizing a single backup and recovery solution for all physical and virtual servers is an organizational best practice; access this exclusive resource to learn 8 reasons why it's better for organizations to have just one and the advantages of using a comprehensive, fully featured solution.

  View Eight Reasons to Use One Backup Solution for Virtual and Physical Machines research abstract

Eight Steps to Better Securing Exchange Server 2010 by Symantec Corporation. December 03, 2012 - Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010.

  View Eight Steps to Better Securing Exchange Server 2010 research abstract

Email archiving FAQ by Symantec Corporation. November 19, 2012 - This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.

  View Email archiving FAQ research abstract

Endpoint Management - IT handbook by Symantec Corporation. September 13, 2012 - Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.

  View Endpoint Management - IT handbook research abstract

Endpoint Protection Small Business Edition by Symantec Corporation. September 05, 2012 - Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.

  View Endpoint Protection Small Business Edition research abstract

Endpoint Security Best Practices by Symantec Corporation. November 26, 2013 - In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.

  View Endpoint Security Best Practices research abstract

Endpoint Security Suites Take Center Stage in the Enterprise by Symantec Corporation. January 04, 2013 - This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.

  View Endpoint Security Suites Take Center Stage in the Enterprise research abstract

Endpoint Security Technology by Symantec Corporation. November 04, 2013 - Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.

  View Endpoint Security Technology research abstract

Enterprise Vault and Microsoft Business Online Productivity Suite by Symantec Corporation. November 18, 2010 - Microsoft Business Productivity Online Suite (BPOS) is a set of Microsoft hosted messaging and collaboration services, which includes Exchange, SharePoint, LiveMeeting and Office Communications Online. This document outlines the integration of the offsite BPOS email service with an on-premises Enterprise Vault solution.

  View Enterprise Vault and Microsoft Business Online Productivity Suite research abstract

ESG: A Phased Approach to Network Access Control (NAC) by Symantec Corporation. July 2008 - Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
  View ESG: A Phased Approach to Network Access Control (NAC) research abstract

Exchange Insider E-Zine: Volume 8 by Symantec Corporation. September 15, 2011 - In this issue of Exchange Insider, we'll cover topics on how to prep for the BlackBerry Enterprise Server for Exchange 2010 SP1, find out if the Exchange 2010 Storage revamp is for the better, and look at the information rights management protection in Exchange 2010.

  View Exchange Insider E-Zine: Volume 8 research abstract

Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ by Symantec Corporation. November 04, 2013 - This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.

  View Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ research abstract

Expert Strategies to Securing a Virtual Environment by Symantec Corporation. November 21, 2012 - This expert e-guide presents three of the most common security problems that IT professionals face in virtual environments and how your business can best overcome them.

  View Expert Strategies to Securing a Virtual Environment research abstract

Expert Video Tip Transcript: Today's Cloud Backup by Symantec Corporation. March 11, 2013 - Access this exclusive Expert Video Tip transcript about current cloud backup options to explore a 10-question Chicago Storage Decisions 2012 Q&A with independent analyst Brien Posey. Read on to learn how cloud backup is being utilized across enterprises and get the scoop on various backup devices.

  View Expert Video Tip Transcript: Today's Cloud Backup research abstract

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by Symantec Corporation. October 09, 2013 - Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.

  View Explaining How Trusted SSL Certificates and Forged SSL Certificates Work research abstract

Exploring New Features, Uses for Secure Web Gateway Appliances by Symantec Corporation. February 08, 2013 - In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.

  View Exploring New Features, Uses for Secure Web Gateway Appliances research abstract

Find the Best Virtual Backup Software for Your Virtualized Environment by Symantec Corporation. December 31, 2013 - Check out this exclusive resource to find research that will help you understand what's new in the virtual backup market, evaluate potential vendors and products and determine which products are best for your business environment.

  View Find the Best Virtual Backup Software for Your Virtualized Environment research abstract

Five Reasons Why a VM Backup Software Purchase Can Go Wrong by Symantec Corporation. February 07, 2014 - Check out this expert e-guide to find out the five reasons why purchasing a virtual machine backup can go wrong.

  View Five Reasons Why a VM Backup Software Purchase Can Go Wrong research abstract

Four Critically Important Things to Know About Hyper-V Backups by Symantec Corporation. February 07, 2014 - Take a look at this expert e-guide to find out the critical details of must-have Hyper-V information, and how it will help you select the best backup solution for your environment.

  View Four Critically Important Things to Know About Hyper-V Backups research abstract

Four Things You Should Know About Securing Your Growing Business by Symantec Corporation. July 06, 2012 - SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.

  View Four Things You Should Know About Securing Your Growing Business research abstract

Get the Most Out of Your Backup Appliance by Symantec Corporation. December 27, 2013 - Want to get the most out of your backup appliance? Explore this informational white paper to find out the various highlights of this backup appliance.

  View Get the Most Out of Your Backup Appliance research abstract

Getting Started with Online Storage for Backup Exec by Symantec Corporation. February 2008 - In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.

  View Getting Started with Online Storage for Backup Exec research abstract

Global Data Deduplication Results with NetBackup PureDisk by Symantec Corporation. February 2008 - At the heart of NetBackup PureDisk customers will find flexible deduplication technology, a highly scalable software-based storage system, and integration with NetBackup for greater functionality.

  View Global Data Deduplication Results with NetBackup PureDisk research abstract

Governance, Risk, Compliance: Policy Management Methods and Tools by Symantec Corporation. December 11, 2009 - IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.

  View Governance, Risk, Compliance: Policy Management Methods and Tools research abstract

Hidden Lynx - Professional Hackers for Hire by Symantec Corporation. September 17, 2013 - In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.

  View Hidden Lynx - Professional Hackers for Hire research abstract

Hidden Lynx – Professional Hackers for Hire by Symantec Corporation. February 17, 2014 - This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.

  View Hidden Lynx – Professional Hackers for Hire research abstract

Honey Stick Report Results by Symantec Corporation. April 09, 2012 - The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.

  View Honey Stick Report Results research abstract

How Archiving Reduces the Cost and Complexity of "Reactive" eDiscovery by Symantec Corporation. September 08, 2011 - This paper attempts to identify and clarify the benefits an archive can provide in the initial phases of the electronic discovery process and look at some of the features companies should look for to ensure those benefits are maximized.

  View How Archiving Reduces the Cost and Complexity of "Reactive" eDiscovery research abstract

How iOS Encryption and Data Protection Work by Symantec Corporation. May 15, 2013 - This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.

  View How iOS Encryption and Data Protection Work research abstract

How Routine Data Center Operations Put Your HA/DR Plans at Risk by Symantec Corporation. February 28, 2014 - Explore this game-changing resource to discover how automated high availability and disaster recovery monitoring and analysis can help your organization reduce the risk of data loss.

  View How Routine Data Center Operations Put Your HA/DR Plans at Risk research abstract

Implementing Highly Available Data Protection with Veritas NetBackup by Symantec Corporation. February 2008 - This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site.

  View Implementing Highly Available Data Protection with Veritas NetBackup research abstract

Improving Deduplication Performance in Virtual Environments with Symantec Backup Exec 2010 R3 by Symantec Corporation. November 22, 2011 - Check out this white paper for an introduction to source dedupe and a list of the benefits it can provide. You will see several real-world scenarios in which source dedupe is utilized to solve the challenges associated with older, obsolete backup methods, and learn about the differences between deduping in a physical and virtual environment.

  View Improving Deduplication Performance in Virtual Environments with Symantec Backup Exec 2010 R3 research abstract

Improving Results for Legal Custody of Information - August 2008 by Symantec Corporation. March 09, 2009 - According to the IT Policy Compliance Group's research report, spending on legal data custody for legal settlements, legal expenses, & costs in IT to find, produce, protect, and preserve information is between 75 and 94 percent lower for firms with the best practices. This report documents which practices are reducing costs and improving results.

  View Improving Results for Legal Custody of Information - August 2008 research abstract

Information Management: The First Step in the Right Direction by Symantec Corporation. March 16, 2011 - This white paper from Symantec Corporation takes an in-depth look into some of the information management strategies companies are using today, and the inefficiencies inherent in them. Read on to learn more about what your company can accomplish in the data center through e-discovery events.

  View Information Management: The First Step in the Right Direction research abstract

Information Retention and eDiscovery Survey by Symantec Corporation. October 17, 2011 - This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.

  View Information Retention and eDiscovery Survey research abstract

Integrated Backup vs. Traditional Disk Libraries by Symantec Corporation. June 11, 2012 - This expert e-guide explores how new integrated backup appliances are being considered an option to traditional disk libraries and other products available today. Read now to learn more.

  View Integrated Backup vs. Traditional Disk Libraries research abstract

Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript by Symantec Corporation. September 30, 2010 - Check out this presentation transcript to learn about an archiving solution that allows businesses to efficiently manage the increasing costs associated with storage growth, compliance and litigation.

  View Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript research abstract

IT Budget Strategy in a Down Economy: Stop Buying Storage! by Symantec Corporation. January 15, 2009 - With the current downturn in today's economy, organizations are reluctant to spend any more money than absolutely necessary. Read this paper to learn how Symantec is uniquely able to deliver products and solutions with the immediate ROI that the current financial situation demands.

  View IT Budget Strategy in a Down Economy: Stop Buying Storage! research abstract

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by Symantec Corporation. March 13, 2009 - With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

  View IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 research abstract

It’s Time for Enterprises to Secure Mac Computers by Symantec Corporation. December 31, 2013 - This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems.

  View It’s Time for Enterprises to Secure Mac Computers research abstract

Knowledge is Power: The Symantec Guide to Protecting your Website by Symantec Corporation. January 30, 2014 - This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.

  View Knowledge is Power: The Symantec Guide to Protecting your Website research abstract

Law & The Data Explosion by Symantec Corporation. September 30, 2010 - This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.

  View Law & The Data Explosion research abstract

Layered Security: Why It Works December 2013 by Symantec Corporation. December 31, 2013 - This guide explores the importance of deep, layered security strategies and how network security can help ensure security for your system.

  View Layered Security: Why It Works December 2013 research abstract

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation. August 03, 2009 - Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.

  View Leveraging a Maturity Model to Achieve “Proactive Compliance” research abstract

Leveraging Clustered File System Software to Deliver Superior Application Availability by Symantec Corporation. December 28, 2010 - Transactional application availability is more important than ever to businesses in a globalized economy. This Vendor Spotlight examines the various architectural approaches to ensuring application uptime and availability, particularly a clustered file system approach with clustered services.

  View Leveraging Clustered File System Software to Deliver Superior Application Availability research abstract

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn by Symantec Corporation. December 14, 2010 - Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.

  View Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn research abstract

Macs, Malware and Security Myths by Symantec Corporation. February 17, 2014 - This in-depth resource takes a look at the various threats that can harm Macs and the role of malware in these potential threats.

  View Macs, Malware and Security Myths research abstract

Magic Quadrant for Endpoint Protection Platforms by Symantec Corporation. January 08, 2014 - This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.

  View Magic Quadrant for Endpoint Protection Platforms research abstract

Managing SSL Certificates with Ease by Symantec Corporation. October 16, 2013 - Learn some of the most common pitfalls associated with SSL certificate management and how SSL certificate management tools can help keep information confidential and secure.

  View Managing SSL Certificates with Ease research abstract

Mistakes Made When Backup Up VMs & How to Prevent Them by Symantec Corporation. September 07, 2012 - This expert E-Guide can help by outlining the 5 most common mistakes made when backing up VMs and how to avoid them.

  View Mistakes Made When Backup Up VMs & How to Prevent Them research abstract

Mitigating Risk in a Mobile World by Symantec Corporation. September 05, 2012 - Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.

  View Mitigating Risk in a Mobile World research abstract

Mobile Security Software Keeps Corporate Data Safe by Symantec Corporation. November 20, 2012 - In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.

  View Mobile Security Software Keeps Corporate Data Safe research abstract

NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection by Symantec Corporation. February 2008 - Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments.

  View NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection research abstract

NetBackup Disk Based Data Protection Options by Symantec Corporation. June 2008 - This paper explains the disk options and their capabilities as well as the other new features in NetBackup 6.5 that make up the Enterprise Disk Foundation, also it provides guidance in choosing the appropriate disk options for your environment.

  View NetBackup Disk Based Data Protection Options research abstract

NetBackup Solutions for VMware by Symantec Corporation. March 06, 2009 - It is critical to choose the right data protection solution, one that is complete, one that not only protects the physical world, but is also finely tuned for the virtual world. The current release of NetBackup delivers award winning solutions for VMware.

  View NetBackup Solutions for VMware research abstract

Next Generation Data Protection with Symantec NetBackup 7 by Symantec Corporation. August 16, 2010 - Read this paper to learn how NetBackup 7 simplifies the protection of your information-driven enterprise by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments.

  View Next Generation Data Protection with Symantec NetBackup 7 research abstract

Next Generation Data Protection with Symantec NetBackup™ 7 by Symantec Corporation. June 24, 2010 - Read this paper to learn how NetBackup 7 simplifies the protection of your information-driven enterprise by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments.

  View Next Generation Data Protection with Symantec NetBackup™ 7 research abstract

Overcoming Applications Barriers to Windows 7 Migration by Symantec Corporation. January 20, 2011 - This paper outlines the applications barrier to Windows 7 migration, explores alternative ways to resolve it, presents Altiris Deployment Solution, and illustrates its compelling advantages for your Windows 7 migration and beyond.

  View Overcoming Applications Barriers to Windows 7 Migration research abstract

Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec by Symantec Corporation. January 19, 2011 - Symantec can help you meet the migration challenge—and capture the opportunity. Read this overview to learn more.

  View Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec research abstract

PassMark Report: Enterprise Endpoint Security Performance Benchmarks by Symantec Corporation. November 30, 2012 - This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.

  View PassMark Report: Enterprise Endpoint Security Performance Benchmarks research abstract

PassMark Success: Endpoint Protection by Symantec Corporation. April 10, 2013 - Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.

  View PassMark Success: Endpoint Protection research abstract

Podcast: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage by Symantec Corporation. March 25, 2014 - This podcast explores how you can take advantage of new business value as data centers evolve and modernize with revolutionary solid-state storage technologies.

  View Podcast: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage research abstract

Ponemon Study: 2011 Cost of a Data Breach by Symantec Corporation. March 31, 2012 - This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.

  View Ponemon Study: 2011 Cost of a Data Breach research abstract

Presentation Transcript: Backup and Archive Are Not the Same Thing! by Symantec Corporation. September 28, 2009 - Discover some of the challenges you'll face when compliance mandates a retention policy that just doesn’t make sense, and learn about some alternate solutions to backup and archiving you may not have considered yet.

  View Presentation Transcript: Backup and Archive Are Not the Same Thing! research abstract

Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise by Symantec Corporation. May 06, 2009 - This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.

  View Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise research abstract

Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management by Symantec Corporation. June 29, 2009 - Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.

  View Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management research abstract

Presentation Transcript: Getting Set for e-Discovery by Symantec Corporation. November 06, 2009 - In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.

  View Presentation Transcript: Getting Set for e-Discovery research abstract

Presentation Transcript: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage by Symantec Corporation. April 04, 2014 - This presentation transcript explores how you can take advantage of new business value as data centers evolve and modernize with revolutionary solid-state storage technologies. Find out what solid state means for long term storage strategies and how to avoid quick fixes that become major pain points in the future.

  View Presentation Transcript: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage research abstract

Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World by Symantec Corporation. June 04, 2012 - Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries.

  View Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World research abstract

Presentation Transcript: The Other Green - Storage Efficiency and Optimization by Symantec Corporation. September 25, 2009 - This session will look at various techniques and strategies to optimize either on-line active or primary as well as near-line or secondary storage environment during tough economic times, as well as to position for future growth, after all, there is no such thing as a data recession!

  View Presentation Transcript: The Other Green - Storage Efficiency and Optimization research abstract

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by Symantec Corporation. June 08, 2012 - In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.

  View Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 research abstract

Presentation Transcript: Understanding Dedupe by Symantec Corporation. August 10, 2010 - Access this presentation transcript, brought to you by SearchStorage.com, to develop a better understanding of data deduplication from one of the world’s leading experts on deduplication – W. Curtis Preston.

  View Presentation Transcript: Understanding Dedupe research abstract

Protecting Your Website With Always On SSL by Symantec Corporation. May 01, 2012 - This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  View Protecting Your Website With Always On SSL research abstract

Put Data Growth in Its Place by Symantec Corporation. November 15, 2010 - It’s a fact: Information–both its availability and accessibility–is critical for the success of any business in a 21st Century economy. Yet most IT organizations are not organized around information, but around infrastructure of servers, storage, and applications. We are entering perilous times for data. Read this white paper to learn more.

  View Put Data Growth in Its Place research abstract

Reduce Cost and Complexity of Your Backup with NetBackup Backup Appliance by Symantec Corporation. November 30, 2013 - There is a backup appliance specifically designed to eliminate the effort and time of installing and maintaining your disaster recovery and backup software and hardware, while saving you money. Read on to learn more.

  View Reduce Cost and Complexity of Your Backup with NetBackup Backup Appliance research abstract

Running Highly Available, High Performance Databases in a SAN-Free Environment by Symantec Corporation. January 31, 2014 - This white paper highlights an in-server solid-state solution that will provide you with 4 times the performance of traditional SAN at an 80% cost reduction.

  View Running Highly Available, High Performance Databases in a SAN-Free Environment research abstract

Running VDI, Virtual Machines on SSD: Matching Form Factor to Application by Symantec Corporation. March 14, 2014 - This e-guide features an interview with George Crump, lead analyst and founder of Storage Switzerland, an analyst firm that focuses on storage, virtualization and cloud technology, which offers up tips and advice on running virtual desktops and virtual machines on solid-state storage.

  View Running VDI, Virtual Machines on SSD: Matching Form Factor to Application research abstract

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by Symantec Corporation. October 17, 2013 - Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

  View Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities research abstract

Securing Data, Not Endpoints: The Best Way to Control Consumerization by Symantec Corporation. November 27, 2012 - Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

  View Securing Data, Not Endpoints: The Best Way to Control Consumerization research abstract

Securing the Cloud for the Enterprise by Symantec Corporation. September 22, 2011 - Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.

  View Securing the Cloud for the Enterprise research abstract

Security as a Service: Benefits and Risks of Cloud-Based Security by Symantec Corporation. March 01, 2013 - Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.

  View Security as a Service: Benefits and Risks of Cloud-Based Security research abstract

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation. March 08, 2011 - The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today.

  View Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments research abstract

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation. March 08, 2011 - The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today.

  View Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments research abstract

Simplify SSL Certificate Management Across the Enterprise by Symantec Corporation. May 07, 2012 - Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.

  View Simplify SSL Certificate Management Across the Enterprise research abstract

Simplify Your Relationship with Endpoint Security by Symantec Corporation. December 07, 2011 - View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.

  View Simplify Your Relationship with Endpoint Security research abstract

Six Email Security Best Practices for Email SaaS by Symantec Corporation. December 03, 2012 - Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.

  View Six Email Security Best Practices for Email SaaS research abstract

Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them by Symantec Corporation. April 30, 2013 - This comprehensive white paper explores six threats to your website and provides a solution for how you can prevent them.

  View Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them research abstract

SMB Backup: Choosing the Best Solution by Symantec Corporation. May 01, 2012 - This latest Storage Magazine column by Lauren Whitehouse explores how to choose the best SMB backup solution, products in this space, and why disk backup is a good backup solution for SMBs. Also learn the top 5 tips for virtual server backup.

  View SMB Backup: Choosing the Best Solution research abstract

SMB cookbook: Whipping up a virtualization disaster recovery plan by Symantec Corporation. May 14, 2013 - This exclusive E-Guide explores how to implement a successful virtualization DR plan for the growing needs and shrinking budgets of today's IT departments.

  View SMB cookbook: Whipping up a virtualization disaster recovery plan research abstract

Solving Common Data Protection Challenges - Advice from the Trenches by Symantec Corporation. February 06, 2014 - Explore this informative resource to find out the top 5 data protection challenges, and how you can overcome them.

  View Solving Common Data Protection Challenges - Advice from the Trenches research abstract

SSD Architecture: Three Deployment Options by Symantec Corporation. March 14, 2014 - This e-guide reveals 3 main ways to deploy SSDs and the pros and cons of each method.

  View SSD Architecture: Three Deployment Options research abstract

SSL Certificate Management: Avoiding Common Mistakes by Symantec Corporation. October 11, 2013 - This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.

  View SSL Certificate Management: Avoiding Common Mistakes research abstract

SSL Certificate Management: Common Mistakes and How to Avoid Them by Symantec Corporation. October 18, 2013 - Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.

  View SSL Certificate Management: Common Mistakes and How to Avoid Them research abstract

State of the Data Center Survey by Symantec Corporation. May 31, 2013 - Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.

  View State of the Data Center Survey research abstract

Stuxnet 0.5: The Missing Link by Symantec Corporation. October 28, 2013 - In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.

  View Stuxnet 0.5: The Missing Link research abstract

Symantec 2010 SMB Information Protection Survey by Symantec Corporation. November 29, 2010 - Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.

  View Symantec 2010 SMB Information Protection Survey research abstract

Symantec 2011 SMB Disaster Preparedness Survey by Symantec Corporation. January 21, 2011 - For the second year, Symantec’s SMB Disaster Preparedness Survey revealed that SMBs are not taking disaster preparedness for their computer and networking systems as seriously as they should. Read this survey and analysis to learn more.

  View Symantec 2011 SMB Disaster Preparedness Survey research abstract

Symantec 2011 SMB Disaster Preparedness Survey by Symantec Corporation. November 22, 2011 - This white paper features the results of Symantec's second SMB disaster preparedness survey, and provides recommendations to help your organization establish and maintain a successful disaster recovery strategy.

  View Symantec 2011 SMB Disaster Preparedness Survey research abstract

Symantec Backup Exec - Superior Protection for Virtual Environments by Symantec Corporation. April 30, 2012 - This 1-page resource reveals how Symantec Backup Exec 2012 with V-Ray technology delivers superior backup and recovery for VMware and Microsoft Hyper-V as well as a host of features unmatched by competitive products. Read now to learn more.

  View Symantec Backup Exec - Superior Protection for Virtual Environments research abstract

Symantec Backup Exec 2012 V-Ray Edition by Symantec Corporation. December 31, 2012 - This informative paper examines a backup and recovery software solution built for companies that have virtualized their environments. Discover how this technology can help you achieve unmatched backup and recovery, deduplication everywhere, victory over complexity and much more. Read on now to learn more.

  View Symantec Backup Exec 2012 V-Ray Edition research abstract

Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server by Symantec Corporation. February 2008 - Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...

  View Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server research abstract

Symantec Backup Exec™ System Recovery 7.0 by Symantec Corporation. August 01, 2007 - Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations.

  View Symantec Backup Exec™ System Recovery 7.0 research abstract

Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery by Symantec Corporation. March 2008 - Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.

  View Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery research abstract

Symantec CEO: "We'll Win in Virtual Backup and the Cloud" by Symantec Corporation. June 11, 2012 - In this interview with SearchDataBackup.com, Symantec CEO Enrique Salem explores the cloud’s role in modern backup and why he expects backup appliances will eventually make up the bulk of backup implementations. Read now to learn more.

  View Symantec CEO: "We'll Win in Virtual Backup and the Cloud" research abstract

Symantec Endpoint Protection 11.0.3 by Symantec Corporation. March 2009 - In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  View Symantec Endpoint Protection 11.0.3 research abstract

Symantec Endpoint Protection 12 by Symantec Corporation. May 26, 2011 - Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  View Symantec Endpoint Protection 12 research abstract

Symantec Endpoint Protection Small Business Edition 12 by Symantec Corporation. May 26, 2011 - Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  View Symantec Endpoint Protection Small Business Edition 12 research abstract

Symantec Enterprise Vault by Symantec Corporation. December 30, 2011 - Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.

  View Symantec Enterprise Vault research abstract

Symantec Enterprise Vault for Microsoft Office SharePoint Server by Symantec Corporation. November 08, 2010 - Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience

  View Symantec Enterprise Vault for Microsoft Office SharePoint Server research abstract

Symantec Intelligence Report - August 2013 by Symantec Corporation. August 31, 2013 - In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.

  View Symantec Intelligence Report - August 2013 research abstract

Symantec Intelligence Report - January 2014 by Symantec Corporation. January 31, 2014 - This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.

  View Symantec Intelligence Report - January 2014 research abstract

Symantec Intelligence Report - June 2013 by Symantec Corporation. June 28, 2013 - This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.

  View Symantec Intelligence Report - June 2013 research abstract

Symantec Intelligence Report 2013 by Symantec Corporation. November 30, 2013 - This in-depth report outlines the latest analysis surrounding cyber security threats and trends.

  View Symantec Intelligence Report 2013 research abstract

Symantec Intelligence Report – May 2013 by Symantec Corporation. May 31, 2013 - Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  View Symantec Intelligence Report – May 2013 research abstract

Symantec Intelligent Data Management by Symantec Corporation. October 12, 2010 - In this Resource Center learn more about a pre-integrated and validated end-to-end storage and data archiving solution. Symantec's archiving solution running on Dell's fully scalable and easy-to-use object storage offering provides a comprehensive archiving solution designed for compliance, retention and data management needs.

  View Symantec Intelligent Data Management research abstract

Symantec Internet Security Threat Report by Symantec Corporation. March 01, 2007 - This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.

  View Symantec Internet Security Threat Report research abstract

Symantec Internet Security Threat Report by Symantec Corporation. April 01, 2008 - The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.

  View Symantec Internet Security Threat Report research abstract

Symantec Internet Security Threat Report by Symantec Corporation. April 30, 2013 - This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  View Symantec Internet Security Threat Report research abstract

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation. April 01, 2009 - This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  View Symantec Internet Security Threat Report: Trends for 2008 research abstract

Symantec Internet Security Threat Report: Trends for 2011 by Symantec Corporation. April 30, 2012 - This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.

  View Symantec Internet Security Threat Report: Trends for 2011 research abstract

Symantec Internet Security Threat Report: Trends for July-December 07 by Symantec Corporation. June 2008 - This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.

  View Symantec Internet Security Threat Report: Trends for July-December 07 research abstract

Symantec IT Compliance Solution by Symantec Corporation. March 2009 - Symantec helps organizations reduce compliance costs by automating key
IT compliance processes, including policy management, controls assessment,
monitoring, remediation, and reporting. Check out this brochure to learn more.

  View Symantec IT Compliance Solution research abstract

Symantec Mail Security for SMTP by Symantec Corporation. May 14, 2007 - Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.

  View Symantec Mail Security for SMTP research abstract

Symantec NetBackup 5000 Appliance: Turnkey Deduplication Solution for the Enterprise by Symantec Corporation. December 28, 2010 - Most IT organizations today are challenged with the problem of rapid data growth. Read this white paper to find the right data management solution for your organization.

  View Symantec NetBackup 5000 Appliance: Turnkey Deduplication Solution for the Enterprise research abstract

Symantec NetBackup, Cisco UCS, and VMware vSphere Joint Backup Performance Benchmark by Symantec Corporation. December 28, 2010 - Obtaining the best possible backup performance is always a team effort in the sense that multiple technologies are brought together to provide optimal data protection performance. Read this white paper to learn why the components described in this document will help you to protect your valuable virtual machine environment.

  View Symantec NetBackup, Cisco UCS, and VMware vSphere Joint Backup Performance Benchmark research abstract

Symantec NetBackup™ 5230 Appliance: NetBackup Appliance versus Build your own Media Server by Symantec Corporation. July 31, 2013 - Appliances are key to saving money, increasing the quality of life and improving productivity. Explore this brief resource to find out how this purpose-built backup appliance can benefit you and your staff.

  View Symantec NetBackup™ 5230 Appliance: NetBackup Appliance versus Build your own Media Server research abstract

Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery by Symantec Corporation. December 27, 2013 - Disasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.

  View Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery research abstract

Symantec NetBackup™: Better Backup for a Virtual World by Symantec Corporation. December 31, 2013 - Commonly recognized as the market leader of enterprise recovery and backup software, this vendor has constructed a backup solution built with the capability to protect the most demanding data center environments. Read now to find out how.

  View Symantec NetBackup™: Better Backup for a Virtual World research abstract

Symantec Protection Network and Online Backup: An Executive Overview by Symantec Corporation. February 2008 - In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.

  View Symantec Protection Network and Online Backup: An Executive Overview research abstract

Symantec Protection Suite Challenge by Symantec Corporation. July 28, 2009 - Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  View Symantec Protection Suite Challenge research abstract

Symantec Protection Suite Enterprise Edition by Symantec Corporation. June 18, 2009 - Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  View Symantec Protection Suite Enterprise Edition research abstract

Symantec Report on Rogue Security Software by Symantec Corporation. October 01, 2009 - The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.

  View Symantec Report on Rogue Security Software research abstract

Symantec SMB Threat Awareness Poll by Symantec Corporation. November 22, 2011 - Symantec conducted its SMB Threat Awareness Poll in September 2011, asking 1,900 SMBs how familiar they are with threats, and what they are doing to protect themselves. This white paper features the results of this survey, and provides best practices and recommendations to help your organization's data stay secure. Read on to learn more.

  View Symantec SMB Threat Awareness Poll research abstract

Symantec Storage Foundation 6.1: Flexible Storage Sharing by Symantec Corporation. December 31, 2013 - This brief resource explores a storage virtualization solution that combines shared and direct-attached storage together without the complexity, cost, or siloed appraoches to typical SAN management.

  View Symantec Storage Foundation 6.1: Flexible Storage Sharing research abstract

Symantec Storage Foundation 6.1: SmartIO by Symantec Corporation. January 31, 2014 - This white paper highlights a storage solution that brings granular, online caching to applications architects, server admins, and database admins to move reads and writes inside the server.

  View Symantec Storage Foundation 6.1: SmartIO research abstract

Symantec Vision 2012: 4 Highlights by Symantec Corporation. June 11, 2012 - This year’s annual Symantec Vision conference in Las Vegas offered focus groups, interactive labs, opportunities for certification and one-on-one sessions with Symantec software experts. Check out this brief E-Guide to learn the specific highlights and announcements made at this event.

  View Symantec Vision 2012: 4 Highlights research abstract

Symantec Web Gateway 5.0 Trialware by Symantec Corporation. July 10, 2012 - In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.

  View Symantec Web Gateway 5.0 Trialware research abstract

Symantec Website Security Threat Report by Symantec Corporation. September 09, 2013 - This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.

  View Symantec Website Security Threat Report research abstract

Symantec's 7 Steps to Windows 7: Planning and Assessment - Presentation Transcript by Symantec Corporation. December 13, 2010 - With the release of Windows 7, many organizations are considering migrating to this new platform. This transcript explores best practices to aid IT pros in this transition. Discover a wide range of hardware and software technology that will help you prepare for this switch.

  View Symantec's 7 Steps to Windows 7: Planning and Assessment - Presentation Transcript research abstract

Symantec™ NetBackup Appliances: Financial Analysis by Symantec Corporation. December 31, 2013 - Did you know you can actually gain more benefits through this vendor's backup appliance than through a traditional build-your-own media server? Explore this informational resource to find out how the industry's only integrated and purpose-built recovery and backup appliance by addressing challenges organizations face.

  View Symantec™ NetBackup Appliances: Financial Analysis research abstract

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge by Symantec Corporation. March 2008 - This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.

  View System Recovery-Breaking through the Dissimilar Hardware Restore Challenge research abstract

Taking the Leap to Virtualization by Symantec Corporation. December 30, 2011 - This short white paper explores key questions you need to ask as you migrate to the virtualized environment to ensure your data remains safe and that you are able to fully reap the benefits that virtualization offers. Read now to learn more.

  View Taking the Leap to Virtualization research abstract

Targeted attacks: Preparation and Mitigation by Symantec Corporation. May 17, 2013 - This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.

  View Targeted attacks: Preparation and Mitigation research abstract

The Evolution and Value of Purpose-Built Backup Appliances by Symantec Corporation. March 31, 2013 - Many are turning to purpose-built backup appliances to gain protection and backup abilities. Explore this resource to make sure you have the proper appliances to support PBBAs.

  View The Evolution and Value of Purpose-Built Backup Appliances research abstract

The hidden costs of self-signed SSL certificates by Symantec Corporation. December 31, 2012 - This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor.

  View The hidden costs of self-signed SSL certificates research abstract

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring by Symantec Corporation. October 17, 2013 - SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.

  View The Pros and Cons of SSL Decryption for Enterprise Network Monitoring research abstract

Tiered Storage Tutorial by Symantec Corporation. December 21, 2010 - Recent technology improvements aiding the success of tiered storage include new solid-state disks (SSDs), improved Serial Attached SCSI (SAS) and more efficient data movement, classification and quality of service (QoS) software. Continue reading this tutorial to learn more.

  View Tiered Storage Tutorial research abstract

Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10 by Symantec Corporation. December 30, 2011 - This short white paper lists the top 10 reasons to archive information with Symantec Enterprise Vault 10. Read now to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.

  View Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10 research abstract

Top 3 Reasons You Need Symantec Storage Foundation High Availability 6.1 by Symantec Corporation. February 28, 2014 - This brief fact sheet covers the top 3 reasons why this storage solution is fit for your needs, as you can achieve increased performance, efficiency and flexibility in your data center.

  View Top 3 Reasons You Need Symantec Storage Foundation High Availability 6.1 research abstract

Top 5 Strategies for Getting an Email Archiving Project off the Ground by Symantec Corporation. December 30, 2011 - This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.

  View Top 5 Strategies for Getting an Email Archiving Project off the Ground research abstract

Top Benefits of Symantec Protection Suite by Symantec Corporation. June 09, 2009 - Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  View Top Benefits of Symantec Protection Suite research abstract

Top Five Strategies for Getting an Email Archiving Project off the Ground by Symantec Corporation. January 15, 2008 - Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of
an email archiving system.

  View Top Five Strategies for Getting an Email Archiving Project off the Ground research abstract

Top Five Ways to Improve E-Discovery with Archiving by Symantec Corporation. January 21, 2008 - Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.

  View Top Five Ways to Improve E-Discovery with Archiving research abstract

Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5 by Symantec Corporation. October 2008 - Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.

  View Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5 research abstract

Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection by Symantec Corporation. July 05, 2012 - The owner of Treehouse in the Glen had found himself spread too thin trying to manage his toy business and the mix of security products they had implemented. In this case study, uncover how he was able to reduce the time spent on managing information security, defend against virus outbreaks and enable faster system performance.

  View Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection research abstract

Understanding Consumer Device Management and BYOD by Symantec Corporation. November 28, 2012 - This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!

  View Understanding Consumer Device Management and BYOD research abstract

Understanding What your Endpoint Security Policy Needs by Symantec Corporation. November 22, 2013 - Access this e-guide for tips to determine whether antivirus alternatives should be brought to your network. Uncover what the future of endpoint antimalware holds, as well as how to detect hostile endpoints.

  View Understanding What your Endpoint Security Policy Needs research abstract

Unlock In-Server Flash with InfiniBand and Symantec Cluster File System powered by Veritas by Symantec Corporation. November 30, 2013 - This resource delivers a solution to maximize the performance of in-server flash in a redundant configuration by incorporating a faster interconnect that moves data between systems.

  View Unlock In-Server Flash with InfiniBand and Symantec Cluster File System powered by Veritas research abstract

Veritas Cluster Server from Symantec by Symantec Corporation. October 31, 2012 - This resource discusses a cluster server platform that ensures high availability and disaster recovery for the most critical applications.

  View Veritas Cluster Server from Symantec research abstract

Veritas NetBackup™ 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies by Symantec Corporation. February 2008 - This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage is used cost-effectively while still maintaining appropriate levels of
recoverability.

  View Veritas NetBackup™ 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies research abstract

Veritas NetBackup for Microsoft Exchange Server Solution Guide by Symantec Corporation. - Upon completion of reading this paper, the reader should be well positioned to describe available data protection solutions for Microsoft Exchange as provided by NetBackup, the NetBackup for Exchange Server agent, and the NetBackup Snapshot Client.

  View Veritas NetBackup for Microsoft Exchange Server Solution Guide research abstract

Veritas NetBackup™ 6.5 for VMware 3.x: Best Practices by Symantec Corporation. November 2007 - This paper covers best practices for designing solutions for--and protecting--VMware virtual machines.

  View Veritas NetBackup™ 6.5 for VMware 3.x: Best Practices research abstract

Virtual Data Center eZine: Backup Strategies for Virtual Servers by Symantec Corporation. June 30, 2010 - This exclusive E-Zine explores some of the challenges surrounding virtualization and how to overcome them.  Find out about the various backup strategies for virtual servers, building a private cloud and how to gauge server resources for endpoint virtualization.

  View Virtual Data Center eZine: Backup Strategies for Virtual Servers research abstract

Virtual Machine Backup and Recovery: Five Critical Decisions by Symantec Corporation. February 28, 2013 - This white paper analyzes 5 critical decisions organizations must make when building a backup and recovery plan and provides two crucial backup and recovery solutions, optimized for organizations with unique requirements.

  View Virtual Machine Backup and Recovery: Five Critical Decisions research abstract

Virtual Machine Backup Strategies for Optimal Business Continuity by Symantec Corporation. May 14, 2013 - This expert E-Guide provides insight into how optimal virtual machine and virtual server backup strategies are key for optimal business continuity.

  View Virtual Machine Backup Strategies for Optimal Business Continuity research abstract

Virtual Machine Protection with Symantec NetBackup 7 by Symantec Corporation. November 15, 2010 - Because of the obvious total cost of ownership benefits of virtualization, virtual machines are assuming more business-critical roles in the data center. In a recent survey, more than 75% of all enterprise companies listed server virtualization as one of the top technologies they are adopting. Read this white paper to learn more.

  View Virtual Machine Protection with Symantec NetBackup 7 research abstract

Virtual Server Backup Software: Best Practices for the Data Center by Symantec Corporation. February 22, 2013 - In this E-Guide from SearchDataCenter.com, we explore the differences between physical server and virtual server backups to help you better evaluate available tools and choose the best solution for your enterprise's needs.

  View Virtual Server Backup Software: Best Practices for the Data Center research abstract

Virtual Server Sprawl and Your Backups: How Can you Cope? by Symantec Corporation. February 10, 2014 - Take a look at this expert e-guide to find helpful tips to keep your virtual machines running smoothly, and overcome some of the challenges virtual machine sprawl presents.

  View Virtual Server Sprawl and Your Backups: How Can you Cope? research abstract

Virtualization and Evolution to the Cloud Survey by Symantec Corporation. July 26, 2011 - The 2011 Virtualization and Evolution to the Cloud Survey explores the goals, attitudes, challenges and experiences of large enterprises around the world as they stand on the brink of moving business-critical applications to virtualized and hybrid cloud environments.

  View Virtualization and Evolution to the Cloud Survey research abstract

Virtualizing Business-Critical Applications With Confidence by Symantec Corporation. December 27, 2010 - Within any business, a number of applications exist that are critical to the success of the business. As a result, these applications and the systems they run on require a higher level of availability. The trade off with increasing application availability is an additional cost in terms of redundant hardware and complexity.

  View Virtualizing Business-Critical Applications With Confidence research abstract

Virtualizing Business-Critical Applications with Confidence by Symantec Corporation. March 08, 2011 - This technical white paper from Symantec Corporation looks at the advantages associated with adopting a VMWare environment in organizations.

  View Virtualizing Business-Critical Applications with Confidence research abstract

Virtualizing Business-Critical Applications With Confidence by Symantec Corporation. November 15, 2010 - Within any business, a number of applications exist that are critical to the success of the business. As a result, these applications and the systems they run on require a higher level of availability. The trade off with increasing application availability is an additional cost in terms of redundant hardware and complexity.

  View Virtualizing Business-Critical Applications With Confidence research abstract

Vulnerability Assessment by Symantec Corporation. October 14, 2013 - Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.

  View Vulnerability Assessment research abstract

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation. February 08, 2013 - This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.

  View Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert research abstract

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by Symantec Corporation. February 11, 2013 - In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  View Web Application Firewalls: Patching, SDLC Key for Security, Compliance research abstract

Web Based Attacks by Symantec Corporation. February 01, 2009 - This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.

  View Web Based Attacks research abstract

Web Browser Security Features Make Attacks Harder by Symantec Corporation. February 11, 2013 - In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.

  View Web Browser Security Features Make Attacks Harder research abstract

Web-Facing Applications: Mitigating Likely Web Application Threats by Symantec Corporation. February 11, 2013 - In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

  View Web-Facing Applications: Mitigating Likely Web Application Threats research abstract

Webcast: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage by Symantec Corporation. March 20, 2014 - In this webinar, discover how you can take advantage of new business value as data centers evolve and modernize with revolutionary solid-state storage technologies.

  View Webcast: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage research abstract

Website Security Threat Report, Part Two by Symantec Corporation. October 11, 2013 - This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.

  View Website Security Threat Report, Part Two research abstract

What to Look For in a Data Protection Solution for Virtual Environments - Data Sheet by Symantec Corporation. September 30, 2012 - This three page white paper provides you with four "must have" features to consider ensuring your backup and recovery solution provides the best data and system protection for any virtual environment.

  View What to Look For in a Data Protection Solution for Virtual Environments - Data Sheet research abstract

What's New in Symantec Data Loss Prevention by Symantec Corporation. April 05, 2013 - This resource demonstrates how organizations can expand the reach of their security teams with improved data loss prevention offering advanced reporting, improved usability and new security integrations.

  View What's New in Symantec Data Loss Prevention research abstract

What's New with Symantec NetBackup™ Appliances by Symantec Corporation. December 27, 2013 - Searching for a backup appliance to support your virtualized data center? This enterprise class appliance leads the integrated purpose-built backup market, with good reason. Read on to learn why.

  View What's New with Symantec NetBackup™ Appliances research abstract

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them by Symantec Corporation. September 20, 2011 - Read this white paper to explore how to make sure your backup and recovery system protects all of your data, all of the time.

  View When Good Backups Go Bad: Data Recovery Failures and What to Do About Them research abstract

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them by Symantec Corporation. November 22, 2011 - In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more.

  View When Good Backups Go Bad: Data Recovery Failures and What to Do About Them research abstract

White Paper: Cloud, Appliance, or Software: Which Backup Solution Is Best for Your Small or Midsize Organization? by Symantec Corporation. December 31, 2011 - Cloud backup is an alternative to an on-premise software application where both the backup application and information storage reside off-site. This allows you to replace expensive upfront investments in backup hardware, software, and personnel with an affordable monthly or yearly subscription-based service. Read now to learn more.

  View White Paper: Cloud, Appliance, or Software: Which Backup Solution Is Best for Your Small or Midsize Organization? research abstract

White Paper: Is Online Backup Right for your Business? 8 Reasons to Consider Protecting Your Data in the Cloud by Symantec Corporation. December 31, 2011 - Without an effective backup strategy in place you could be at risk for financial loss, legal liability and damage to your reputation. This white paper discusses 8 compelling reasons to consider a cloud-based, online approach to backup. Read now to learn more.

  View White Paper: Is Online Backup Right for your Business? 8 Reasons to Consider Protecting Your Data in the Cloud research abstract

Why choose Symantec for Mobile Device Management by Symantec Corporation. June 01, 2012 - In this white paper, learn some of the most important considerations for deploying a mobile device management solution. Additionally, discover key tips for building a successful framework for planning your mobile security strategy.

  View Why choose Symantec for Mobile Device Management research abstract

Why Compliance Pays: Reputations and Revenues at Risk Research Report by Symantec Corporation. March 2009 - Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime.

  View Why Compliance Pays: Reputations and Revenues at Risk Research Report research abstract

Your Backup Is Not an Archive by Symantec Corporation. December 27, 2010 - Data growth, budget pressure, rising service-level requirements, and new technologies like virtualization strain the capabilities of traditional backup and recovery processes, but recent advances in data protection and management unlock an optimized strategy. Read on to learn more.

  View Your Backup Is Not an Archive research abstract

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths by Symantec Corporation. October 16, 2013 - As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.

  View Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts