ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Symantec Corporation

  • Virtual Server Backup Software: Best Practices for the Data Center

    In this E-Guide from SearchDataCenter.com, we explore the differences between physical server and virtual server backups to help you better evaluate available tools and choose the best solution for your enterprise's needs.

  • Web Browser Security Features Make Attacks Harder

    In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.

  • Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert

    This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.

  • Cloud Backup Versus Cloud Storage Comparison

    This exclusive SearchStorage.com E-Guide takes a close and clear look at cloud storage and backup so you can arm yourself with the correct facts. Check it out now for a comparison of cloud backup, cloud storage and storage in the cloud, and learn how to differentiate between cloud backup, recovery and restore.

  • Domino Security Vulnerabilities to Watch For

    Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.

  • E-Discovery Cloud Considerations

    In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

  • Cloud-Based Email Archiving Pros and Cons

    Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest.

  • Eight Steps to Better Securing Exchange Server 2010

    Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010.

  • Six Email Security Best Practices for Email SaaS

    Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.

  • Bringing the Network Perimeter Back From the 'Dead'

    There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.

  • Comparing Email Archiving Software with General Archiving Software

    Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.

  • Archiving in the Cloud: Essential Tips and Questions to Answer

    Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.

  • Email archiving FAQ

    This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.

  • Symantec Enterprise Vault

    Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.

  • 2012 - Endpoint Security Best Practices Survey

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • Law & The Data Explosion

    This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.

  • Endpoint Protection Small Business Edition

    Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.

  • Symantec Web Gateway 5.0 Trialware

    In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.

  • Four Things You Should Know About Securing Your Growing Business

    SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.

  • American Equipment, Symantec Technologies and Wasatch Software Success

    Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.

  • Defending Systems on a Wide-open Network with Symantec Endpoint Protection

    Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.

  • 2012 Endpoint Security Best Practices Survey

    Today’s SMBs are increasingly forced to invest in new measures to protect their endpoints and their business from cyber threats. This resource explores key findings from the Symantec 2012 Endpoint Security Survey and offers best practices and recommendations for reducing the risk of a successful cyber attack.

  • Integrated Backup vs. Traditional Disk Libraries

    This expert e-guide explores how new integrated backup appliances are being considered an option to traditional disk libraries and other products available today. Read now to learn more.

  • Symantec CEO: "We'll Win in Virtual Backup and the Cloud"

    In this interview with SearchDataBackup.com, Symantec CEO Enrique Salem explores the cloud’s role in modern backup and why he expects backup appliances will eventually make up the bulk of backup implementations. Read now to learn more.

  • Presentation Transcript: Threat Update: Top Trends to Focus on for 2012

    In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.