Symantec Enterprise ProfessionalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Symantec Enterprise Professional returned the following results.
RSS What is RSS?
Related Categories

 •   Backup Systems and Services
 •   Storage Management
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Disk-based Backup & Storage/ RAID
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Anti-Virus Solutions
 •   Enterprise Systems Management

Related Searches
 •   Design Symantec Enterprise
 •   Designing Symantec
 •   Graphs Symantec Enterprise Professional
 •   Making Symantec Enterprise
 •   Reports Symantec
 •   Symantec Enterprise Professional Quality
 •   Symantec Enterprise Professional Testing
 •   Symantec Reporting
 •   Symantec Spreadsheets
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Archiving with Symantec Enterprise Vault and Dell DX Object Storage by Dell, Inc.

June 06, 2011 - (Free Research)
Check out this short video from Dell to learn about Dell DX Object Storage Platform and Symantec Enterprise Vault - and how the pair can provide a comprehensive archive solution designed to help you better store, manage and discover your unstructured data. 
(VIDEO) READ ABSTRACT |

Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10 by Symantec Corporation

December 30, 2011 - (Free Research)
This short white paper lists the top 10 reasons to archive information with Symantec Enterprise Vault 10. Read now to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze. 
(WHITE PAPER) READ ABSTRACT |

Symantec Enterprise Vault for Microsoft Office SharePoint Server by Symantec Corporation

November 08, 2010 - (Free Research)
Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience 
(DATA SHEET) READ ABSTRACT |

Symantec Enterprise Vault by Symantec Corporation

December 30, 2011 - (Free Research)
Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze. 
(WHITE PAPER) READ ABSTRACT |

Backup Exec 2010: Archiving Options by Symantec Corporation

July 15, 2010 - (Free Research)
Symantec makes it easier for companies of all sizes to store, manage, protect, and discover Exchange and Windows file servers, with Backup Exec’s new Archiving Options, powered by market-leading Symantec Enterprise Vault. Learn and explore Backup Exec 2010 Archiving Options in this insightful white paper. 
(WHITE PAPER) READ ABSTRACT |

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process by Symantec Corporation

June 2008 - (Free Research)
The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness. 
(BOOK) READ ABSTRACT |

Information Security Magazine - March 2013 by SearchSecurity.com

March 2013 - (Free Research)
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more. 
(EZINE) READ ABSTRACT |

IT Security Case Studies by ComputerWeekly.com

June 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine - February 2013 by SearchSecurity.com

February 2013 - (Free Research)
In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more. 
(EZINE) READ ABSTRACT |

Symantec Protection Suite Enterprise Edition by Symantec Corporation

June 2009 - (Free Research)
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure. 
(TRIAL SOFTWARE)

Case Study: Professional Accounting Solutions cuts power consumption by 50% and enjoys four-fold faster backups by Dell, Inc.

May 2010 - (Free Research)
Professional Accounting Solutions needed to reduce power consumption to benefit from a price reduction in a co-location facility and consolidate its 40 servers and 2 SANs to minimize its hardware footprint. Read this case study to learn about the benefits PAS achieved by implementing solutions from Dell, Dell/EMC and Microsoft. 
(CASE STUDY) READ ABSTRACT |

IT and Analyst Testimonials: TCO Considerations for PC Refresh and Intel vPro Technology by Intel Corporation

May 2009 - (Free Research)
In this video IT professionals from the Symantec ManageFusion Conference discuss how PC refresh and Intel vPro technology helps minimize total cost of ownership. 
(VIDEO)

Symantec Endpoint Protection 11.0.3 by Symantec Corporation

March 2009 - (Free Research)
In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested. 
(WHITE PAPER) READ ABSTRACT |

Hidden Lynx – Professional Hackers for Hire by Symantec Corporation

February 2014 - (Free Research)
This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system. 
(WEBCAST) READ ABSTRACT |

Symantec Vision 2012: 4 Highlights by Symantec Corporation

June 2012 - (Free Research)
This year’s annual Symantec Vision conference in Las Vegas offered focus groups, interactive labs, opportunities for certification and one-on-one sessions with Symantec software experts. Check out this brief E-Guide to learn the specific highlights and announcements made at this event. 
(EGUIDE) READ ABSTRACT |

CW Special report on Symantec by ComputerWeekly.com

May 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

Quantum DXi-Series and Symantec NetBackup OpenStorage – Centrally Managed Edge-to-Core Data Protection: An ESG Lab Report by Quantum Corporation

September 2009 - (Free Research)
Read this ESG Lab report as they analyze Quantum’s DXi-Series appliances working with the Symantec NetBackup OpenStorage interface and their ability to optimize data protection and recovery strategies in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

ESG Lab Report: Quantum DXi-Series and Symantec NetBackup OpenStorage – Centrally Managed Edge-to-Core Data Protection by Quantum Corporation

September 2009 - (Free Research)
Read this ESG Lab report as they analyze Quantum’s DXi-Series appliances working with the Symantec NetBackup OpenStorage interface and their ability to optimize data protection and recovery strategies in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Symantec IT Compliance Solution by Symantec Corporation

March 2009 - (Free Research)
Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more. 
(ARTICLE)

Building momentum: Symantec's new approach to security by TechTarget

March 2014 - (Free Research)
Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth. 
(RESOURCE)

Building momentum: Symantec's new approach to security by TechTarget

March 2014 - (Free Research)
Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth. 
(RESOURCE)

Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery by Symantec Corporation

March 2008 - (Free Research)
Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days. 
(WHITE PAPER) READ ABSTRACT |

Virtual Machine Backup and Recovery: Five Critical Decisions by Symantec Corporation

February 2013 - (Free Research)
This white paper analyzes 5 critical decisions organizations must make when building a backup and recovery plan and provides two crucial backup and recovery solutions, optimized for organizations with unique requirements. 
(WHITE PAPER) READ ABSTRACT |

Symantec's 7 Steps to Windows 7: Planning and Assessment - Presentation Transcript by Symantec Corporation

December 2010 - (Free Research)
With the release of Windows 7, many organizations are considering migrating to this new platform. This transcript explores best practices to aid IT pros in this transition. Discover a wide range of hardware and software technology that will help you prepare for this switch. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

April 2008 - (Free Research)
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts