symantec

Results 1 - 25 of 582Sort Results By: Published Date | Title | Company Name
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise, email, devices, apps, it management
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, business technology, data center
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, business technology, data center
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate, insiders, anxiety, theft, stealing, steal, data, employees, protection, secure, conditions, security, it management
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Hear from real-world IT professionals about their experiences using Backup ExecT 2012.
Tags : 
backup and recovery, cloud based backup systems, symantec, testimonials
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Great new features like VMware and Hyper-V backup, bare-metal disaster recovery and "no-hardware disaster recovery" all help conveniently keep your backups easily accessible and secure.
Tags : 
data recovery, backup and recovery, backup solutions, symantec, deduplication, virtualization, data storage, data management, disaster recovery
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
As you try to restore a critical backup, is there a more unnerving question than, "What happened to my data?" See how you can avoid the classic pitfalls of backing up data and learn what to do in the event that your backups go bad.
Tags : 
data management, backup and recovery, disaster recovery, symantec, data recovery
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
See what happens if you neglect to protect your mission-critical applications and data, and learn what you can do to mitigate disaster.
Tags : 
data protection, data recovery, backup and recovery, disaster recovery, cloud-based backup services, virtualization
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
See how The Cardian and Vascular Institute of Gainesville developed a reliable IT solution and developed a reliable and scalable data center.
Tags : 
case study, data recovery, disaster recovery, backup strategy, symantec
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Deduplication can save you time and money when backing up your company's data. Discover how it works, how it fits into your existing data infrastructure and how it assists in disaster recovery.
Tags : 
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Have questions about what exactly Data Deduplication does for your business? This Q & A addresses a few commonly asked questions about Data Deduplication.
Tags : 
data deduplication, smb, disaster recovery, backup and recovery, data management
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
When Franklin Pierce University's IT Team decided to upgrade their backup system to DXi Deduplication, they doubled the performance and reduced management time by 20%. Find out how.
Tags : 
data deduplication, virtualization, backup and recovery, disaster recovery, case study
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery, backup and recovery
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 07, 2012
A practical guide to protecting and leveraging your virtual environment for rapid recovery.
Tags : 
cdw, symantec, disaster recovery, virtual environment, business technology
    
CDW Symantec
Published By: Cisco     Published Date: Sep 15, 2015
In the following pages, you’ll learn why applications are increasingly crucial to businesses (page 4). You’ll get unique perspectives from industry analysts and software automation visionaries (pages 10 and 15). and you’ll hear from companies that are already taking advantage of aCI, like acxiom (page 8), Netapp (page 12), and Symantec (page 14).
Tags : 
iot, datacenter, aci, enterprise, networking
    
Cisco
Published By: Cisco     Published Date: Sep 17, 2015
Symantec Delivering on Its Strategic Vision with Next-Generation Secure Datacenter Powered by Cisco ACI
Tags : 
datacenter, aci, enterprise, networking
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Read more to learn how Symantec delivers on its strategic vision with Next-Generation Secure Datacenter powered by Cisco ACI.
Tags : 
    
Cisco
Published By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
Cylance
Published By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : 
certifiedmail, borderware, postini, symantec, workshare, data management
    
DataMotion
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.