Symantec UserWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Symantec User returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Endpoint Security
 •   Backup Systems and Services
 •   Network Security
 •   Storage Management
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID
 •   Security Monitoring
 •   Application Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Accessing Symantec User
 •   Solution Symantec User
 •   Symantec Conferences
 •   Symantec Production
 •   Symantec Purchasing
 •   Symantec User Colorado
 •   Symantec User Control
 •   Symantec User Demos
 •   Symantec User Order
 •   Symantec User Uk
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Symantec Report on Rogue Security Software by Symantec Corporation

October 01, 2009 - (Free Research)
The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 01, 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

Symantec Vision 2012: 4 Highlights by Symantec Corporation

June 11, 2012 - (Free Research)
This year’s annual Symantec Vision conference in Las Vegas offered focus groups, interactive labs, opportunities for certification and one-on-one sessions with Symantec software experts. Check out this brief E-Guide to learn the specific highlights and announcements made at this event. 
(EGUIDE) READ ABSTRACT |

Symantec Protection Suite Enterprise Edition by Symantec Corporation

June 18, 2009 - (Free Research)
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure. 
(TRIAL SOFTWARE)

Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery by Symantec Corporation

March 2008 - (Free Research)
Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by Symantec Corporation

June 2012 - (Free Research)
In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by Symantec Corporation

March 2009 - (Free Research)
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security. 
(DOWNLOAD)

Symantec Intelligence Report – May 2013 by Symantec Corporation

May 2013 - (Free Research)
Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future. 
(WHITE PAPER) READ ABSTRACT |

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge by Symantec Corporation

March 2008 - (Free Research)
This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware. 
(WHITE PAPER) READ ABSTRACT |

Honey Stick Report Results by Symantec Corporation

April 2012 - (Free Research)
The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information. 
(WHITE PAPER) READ ABSTRACT |

Symantec Enterprise Vault for Microsoft Office SharePoint Server by Symantec Corporation

November 2010 - (Free Research)
Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience 
(DATA SHEET) READ ABSTRACT |

IT Security Case Studies by ComputerWeekly.com

June 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation

March 2011 - (Free Research)
The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today. 
(WHITE PAPER) READ ABSTRACT |

Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments by Symantec Corporation

March 2011 - (Free Research)
The conversation around desktop virtualization at the enterprise level is changing. Once reserved primarily for use by remote users, advances in desktop virtualization technology coupled with dramatic price declines in desktop, networking and storage components have made it practical and affordable. Read on to learn more about virtualization today. 
(WHITE PAPER) READ ABSTRACT |

Top Five Strategies for Getting an Email Archiving Project off the Ground by Symantec Corporation

January 2008 - (Free Research)
Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of an email archiving system. 
(DATA SHEET) READ ABSTRACT |

What's New in Symantec Data Loss Prevention by Symantec Corporation

April 2013 - (Free Research)
This resource demonstrates how organizations can expand the reach of their security teams with improved data loss prevention offering advanced reporting, improved usability and new security integrations. 
(WHITE PAPER) READ ABSTRACT |

Quantum DXi 7500 Support for Veritas NetBackup 6.5 VTL-Direct-to-Tape Feature from Symantec by Quantum Corporation

June 2008 - (Free Research)
The DXi7500 is the disk backup and remote replication system for data centers where a premium is placed on scalability, performance, high availability, and flexibility. 
(WHITE PAPER) READ ABSTRACT |

NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection by Symantec Corporation

February 2008 - (Free Research)
Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

Symantec Endpoint Protection Small Business Edition 12 by Symantec Corporation

May 2011 - (Free Research)
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats. 
(DOWNLOAD) READ ABSTRACT |

Symantec Endpoint Protection 12 by Symantec Corporation

May 2011 - (Free Research)
Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats. 
(DOWNLOAD) READ ABSTRACT |

Top Benefits of Symantec Protection Suite by Symantec Corporation

June 2009 - (Free Research)
Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization. 
(WHITE PAPER) READ ABSTRACT |

CW Special report on Symantec by ComputerWeekly.com

May 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

Symantec Endpoint Protection 11.0.3 by Symantec Corporation

March 2009 - (Free Research)
In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts