Symantec Corporation Company ReportWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Report
Symantec Corporation
Company URL: http://www.symantec.com

Overview:
A world leader in Internet security technology and technology solutions that enable corporate organizations to manage the cost of ownership associated with supporting and servicing users of laptop computers and other mobile devices.

> Return to Search Results

Company Information
Public or private company: Private

Company Locations
Corporate Headquarters
This location offers:
Corporate Headquarters
20330 Stevens Creek Blvd.
Cupertino California 95014-2132
United States

Solutions and Research
Research 2010 Annual Study: U.S. Enterprise Encryption Trends
2010 SMB Information Protection Survey by Symantec
2012 - Endpoint Security Best Practices Survey
2012 Endpoint Security Best Practices Survey
2012 Endpoint Security Best Practices Survey Results
5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
6 Steps to Prevent a Data Breach
7 Requirements of Data Loss Prevention
8 Questions to Ask Before Moving to the Cloud
8 reasons to upgrade your backup solution
A Candid Examination of Data Deduplication
A Candid Examination of Data Deduplication
Accelerate Your Success Through Virtualization
Agent based vs host based virtualization backups: has the market shifted?
Agent vs Agentless VM Backup and Recovery - Data Sheet
American Equipment, Symantec Technologies and Wasatch Software Success
Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
Archiving in the Cloud: Essential Tips and Questions to Answer
Attacks on Point of Sale Systems
Backup Exec 2010: Archiving Options
Backup Exec 2010: Deduplication Option
Backup Exec 2010: Protect More, Store Less, Save More
Best and worst practices for email archiving in Exchange Server
Best Practice for NDMP Backup Veritas NetBackup
Best Practices for Archiving Lotus Domino Environments
Best Practices for Backup and Recovery
Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery
Best Practices for Breaking Down the Barriers to Centralized Virtual Server Backup and Recovery
Best Practices for Defining and Establishing Effective Archive Retention Policies
Best Practices for Endpoint Data Loss Prevention
Best Practices for Protecting Microsoft Exchange
Best Practices for Windows Vista Planning, Migration, and Ongoing Management
Best Practices: Backing Up VMware with Veritas NetBackup
Better Backup for Big Data
Big Data Begins with Better Backup
Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
Bringing the Network Perimeter Back From the 'Dead'
Building the Business Case for Integrated Backup Appliances
Business Value Analysis Study: Citizens Business Bank
BYOD Security Policy, not MDM, at Heart of Smartphone Security
Choosing Linux as a Strategic Platform
Cloud Backup Versus Cloud Storage Comparison
Cloud Backup: Terms and Trends
Cloud Disaster Recovery: Practical Applications and Pointers for the SMB
Cloud Endpoint Security: Considerations for Cloud Security Services
Cloud-Based Email Archiving Pros and Cons
Comparing Email Archiving Software with General Archiving Software
Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
Comprehensive SQL Server Data Protection with Symantec Backup Exec 11d
Control Compliance Suite Trialware
Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
Data Deduplication Technology Tutorial: A guide to data deduping and backup
Data Loss Prevention Survey
Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
Deduplication Backup Basics for Small Businesses
Defending Systems on a Wide-open Network with Symantec Endpoint Protection
DLP Content Discovery: Best Practices for Stored Data Discovery and Protection
Domino Security Vulnerabilities to Watch For
Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
Don't Wait Until It's Too Late: Backup to the Cloud to Protect Your Business from Disaster
Dynamic Storage Tiering Options
e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff
e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
e-Book: Chapter 5 - Understanding the Data Collection Process
e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards
E-Book: Storage for PACS
E-Discovery Cloud Considerations
E-Guide: Backing up Your Virtual Server
E-Guide: Choosing a Data Archiving Strategy: Disk, Tape or Both?
E-Guide: Climbing the Uphill Battle of Exponential Data Growth
E-Guide: How to secure virtual environments: 3 things to keep in mind
E-Guide: Improving Storage Efficiencies in your Storage Environment
E-guide: Top Tips for Today’s Archiver
E-Guide: When do You Archive? When do You Backup?
eBook-- Defining an Email-Archiving Policy
eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity
Eight Reasons to Use One Backup Solution for Virtual and Physical Machines
Eight Steps to Better Securing Exchange Server 2010
Email archiving FAQ
Endpoint Protection Platforms for Enterprises
Endpoint Protection Small Business Edition
Endpoint Security Best Practices
Endpoint Security Suites Take Center Stage in the Enterprise
Endpoint Security Technology
Enterprise Vault and Microsoft Business Online Productivity Suite
Enterprise Vault Archiving Overview
ESG: A Phased Approach to Network Access Control (NAC)
Exchange Insider E-Zine: Volume 8
Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ
Expert Video Tip Transcript: Today's Cloud Backup
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Find the Best Virtual Backup Software for Your Virtualized Environment
Five DLP Tips From Security Executives
Five Reasons Why a VM Backup Software Purchase Can Go Wrong
Focused IT Compliance at Barnabas Health
Four Critically Important Things to Know About Hyper-V Backups
Four Things You Should Know About Securing Your Growing Business
Getting Started with Online Storage for Backup Exec
Global Data Deduplication Results with NetBackup PureDisk
Governance, Risk, Compliance: Policy Management Methods and Tools
Hidden Lynx – Professional Hackers for Hire
Hidden Lynx: Professional Hackers for Hire
Honey Stick Report Results
How Archiving Reduces the Cost and Complexity of "Reactive" eDiscovery
How iOS Encryption and Data Protection Work
Implementing Highly Available Data Protection with Veritas NetBackup
Improving Deduplication Performance in Virtual Environments with Symantec Backup Exec 2010 R3
Improving Results for Legal Custody of Information - August 2008
Industry Perspectives: The Impact of HIPAA and HITECH
Information Management: The First Step in the Right Direction
Information Retention and eDiscovery Survey
Integrated Backup vs. Traditional Disk Libraries
Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript
Internet Security Threat Report - 2014
IT Budget Strategy in a Down Economy: Stop Buying Storage!
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
Knowledge is Power: The Symantec Guide to Protecting your Website
Law & The Data Explosion
Layered Security: Why It Works - December 2013
Leveraging a Maturity Model to Achieve “Proactive Compliance”
Leveraging Clustered File System Software to Deliver Superior Application Availability
Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
Manage Unstructured Data Growth with Symantec Data Insight
Manage Unstructured Data with Symantec Data Insight
Managing SSL Certificates with Ease
Messaging Security: Understanding the Threat of eMail and IM Attacks
Mistakes Made When Backup Up VMs & How to Prevent Them
Mitigating Risk in a Mobile World
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection
NetBackup Disk Based Data Protection Options
NetBackup Solutions for VMware
Next Generation Data Protection with Symantec NetBackup 7
Next Generation Data Protection with Symantec NetBackup™ 7
Optimize your storage solution with PBBAs
Overcoming Applications Barriers to Windows 7 Migration
Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec
PassMark Report: Enterprise Endpoint Security Performance Benchmarks
PassMark Success: Endpoint Protection
Ponemon Study: 2011 Cost of a Data Breach
Presentation Transcript: Backup and Archive Are Not the Same Thing!
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management
Presentation Transcript: Getting Set for e-Discovery
Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World
Presentation Transcript: The Other Green - Storage Efficiency and Optimization
Presentation Transcript: Threat Update: Top Trends to Focus on for 2012
Presentation Transcript: Understanding Dedupe
Protecting Your Website With Always On SSL
Providence Health & Services is Reacting to Threats Five Times Faster
Put Data Growth in Its Place
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Running Highly Available, High Performance Databases in a SAN-Free Environment
Running VDI, Virtual Machines on SSD: Matching Form Factor to Application
Securing the Cloud for the Enterprise
Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments
Seven Keys to Selecting the Right Storage Architecture for Enterprise VDI Deployments
Simplify implementation of the HITRUST Common Security Framework
Simplify SSL Certificate Management Across the Enterprise
Simplify Your Relationship with Endpoint Security
Six Email Security Best Practices for Email SaaS
Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them
SMB Backup: Choosing the Best Solution
SMB cookbook: Whipping up a virtualization disaster recovery plan
SSD Architecture: Three Deployment Options
SSL Certificate Management: Avoiding Common Mistakes
State of the Data Center Survey
Stuxnet 0.5: The Missing Link
Symantec 2010 SMB Information Protection Survey
Symantec 2011 SMB Disaster Preparedness Survey
Symantec 2011 SMB Disaster Preparedness Survey
Symantec Backup Exec - Superior Protection for Virtual Environments
Symantec Backup Exec 2012 V-Ray Edition
Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
Symantec Backup Exec™ System Recovery 7.0
Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery
Symantec CEO: "We'll Win in Virtual Backup and the Cloud"
Symantec Data Insight 4.0
Symantec Endpoint Protection 11.0.3
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12 Trialware
Symantec Endpoint Protection Small Business Edition 12
Symantec Enterprise Vault
Symantec Enterprise Vault for Microsoft Office SharePoint Server
Symantec Intelligence Report - August 2013
Symantec Intelligence Report - January 2014
Symantec Intelligence Report - June 2013
Symantec Intelligence Report 2013
Symantec Intelligence Report – May 2013
Symantec Intelligent Data Management
Symantec Internet Security Threat Report
Symantec Internet Security Threat Report
Symantec Internet Security Threat Report
Symantec Internet Security Threat Report: Trends for 2008
Symantec Internet Security Threat Report: Trends for 2011
Symantec Internet Security Threat Report: Trends for July-December 07
Symantec IT Compliance Solution
Symantec Mail Security for SMTP
Symantec NetBackup 5000 Appliance: Turnkey Deduplication Solution for the Enterprise
Symantec NetBackup, Cisco UCS, and VMware vSphere Joint Backup Performance Benchmark
Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
Symantec Protection Network and Online Backup: An Executive Overview
Symantec Protection Suite Challenge
Symantec Protection Suite Enterprise Edition
Symantec Report on Rogue Security Software
Symantec SMB Threat Awareness Poll
Symantec Storage Foundation 6.1: Flexible Storage Sharing
Symantec Storage Foundation 6.1: SmartIO
Symantec Vision 2012: 4 Highlights
Symantec Web Gateway 5.0 Trialware
Symantec Website Security Threat Report
Symantec's 7 Steps to Windows 7: Planning and Assessment - Presentation Transcript
Symantec™ NetBackup Appliances: Financial Analysis
System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
Taking the Leap to Virtualization
The backup appliance that can provide agility for your workloads
The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
Tiered Storage Tutorial
Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10
Top 3 Reasons You Need Symantec Storage Foundation High Availability 6.1
Top 5 Strategies for Getting an Email Archiving Project off the Ground
Top Benefits of Symantec Protection Suite
Top Five Strategies for Getting an Email Archiving Project off the Ground
Top Five Ways to Improve E-Discovery with Archiving
Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection
Veritas Cluster Server from Symantec
Veritas NetBackup™ 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies
Veritas NetBackup for Microsoft Exchange Server Solution Guide
Veritas NetBackup™ 6.5 for VMware 3.x: Best Practices
Virtual Data Center eZine: Backup Strategies for Virtual Servers
Virtual Machine Protection with Symantec NetBackup 7
Virtual Server Backup Software: Best Practices for the Data Center
Virtual Server Sprawl and Your Backups: How Can you Cope?
Virtualization and Evolution to the Cloud Survey
Virtualizing Business-Critical Applications With Confidence
Virtualizing Business-Critical Applications with Confidence
Virtualizing Business-Critical Applications With Confidence
Vulnerability Assessment
Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
Web Based Attacks
Web Browser Security Features Make Attacks Harder
Webcast: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage
Webcast: Symantec Internet Security Threat Report 2014
Website Security Threat Report, Part Two
What to Look For in a Data Protection Solution for Virtual Environments - Data Sheet
What's New in Symantec Data Loss Prevention
What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk
When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
White Paper: Cloud, Appliance, or Software: Which Backup Solution Is Best for Your Small or Midsize Organization?
White Paper: Is Online Backup Right for your Business? 8 Reasons to Consider Protecting Your Data in the Cloud
Why choose Symantec for Mobile Device Management
Why Compliance Pays: Reputations and Revenues at Risk Research Report
Why It’s Time for Enterprises to Secure Mac Computers
Your Backup Is Not an Archive
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
 

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts