symantec

Results 126 - 150 of 582Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Nov 19, 2014
This info-graphic provides important statistics and information on web-based targeted attacks and how you can help protect yourself.
Tags : 
web based targeted attacks, internet security, protections from web attacks
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
The top ten tips on how to secure your business against cyber risk and threats.
Tags : 
tips for cyber resilience
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.
Tags : 
the cost of a data breach, business costs of a data breach, responses to a data breach
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive report to learn how NetApp direct-to-tape technology can reduce the number of media servers required to support a solution, which can reduce hardware, software, and management costs by utilizing the VTL to perform tape exports.
Tags : 
netapp backup recovery, symantec, esg, virtual tape library, raid, storage
    
NetApp Backup & Recovery
Published By: Symantec.cloud     Published Date: May 11, 2012
The Symantec 2012 Endpoint Security Best Practices Survey reveals that organizations employing best practices are enjoying dramatically better outcomes when it comes to endpoint protection, and many of these best practices can-and should-be leveraged by SMBs.
Tags : 
symantec, cloud, endpoint security, technology, smb, protection
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: May 11, 2012
Powerful backup and flexible deployment options, including enhanced software, backup appliances, and backup solutions in the cloud, offer flexibility and choice in how you manage backup, allowing you to deploy a modern infrastructure that best suits your IT requirements, business needs, and environment. But how do you know which backup strategy is right for your business? Read this whitepaper to better understand which deployment option could best suit your needs.
Tags : 
symantec, cloud, computing, technology, recovery, backup, solutions
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: May 11, 2012
Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
Tags : 
symantec, cloud, backup, technology, system failure, recovery
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll learn how to protect your valuable assets without the expense or time commitment of building a full IT infrastructure.
Tags : 
database security, data management, data and security, smb, cloud based security, security, business technology, data center
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll find principles for effective and efficient disaster recovery, insights on how to ensure your backup solution meets your organization's needs, and what steps you should take to minimize business disruptions due to disasters.
Tags : 
data security, data protection, symantec, data recovery, data loss, disaster recovery, backup and recovery, symantec, security, data management, data center
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper you'll why it is important to have a backup solution that protects your data - and that can restore it with a minimum of delay at a critical time.
Tags : 
smbs, backup and recovery, data protection, backup solutions, data restoration, symantec, security, data management, business technology, data center
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to discover the four key things you should know about securing small to medium enterprises in the current business landscape.
Tags : 
smb, data security, database security, backup and recovery, data loss, malware, security, data management, business technology, data center
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper, Symantec offers seven tips for how business owners can beef up and protect their company.
Tags : 
it security, smb, symantec, data security, disaster recovery, backup and recovery, security solutions, security, data management, business technology, data center
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to learn three useful steps to protect your virtual systems. There's no better time than the present to give your virtual systems top-of-the-line backup and restore protection.
Tags : 
virtual systems. virtualization, backup and recovery, backup automation, symantec, security, data management, business technology, data center
    
Symantec.cloud
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention
    
PC Mall
Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management, data management, business technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Mar 21, 2014
Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Mar 21, 2014
Adopting a managed approach to web security and regulatory compliance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.