ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Symantec Corporation

  • Symantec Protection Suite Challenge

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • eBook-- Defining an Email-Archiving Policy

    Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

  • Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management

    Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.

  • Top Five Strategies for Getting an Email Archiving Project off the Ground

    Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of an email archiving system.

  • Top Five Ways to Improve E-Discovery with Archiving

    Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.

  • Symantec Protection Suite Enterprise Edition

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • 5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know

    Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.

  • Web Based Attacks

    This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.

  • Top Benefits of Symantec Protection Suite

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  • Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise

    This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.

  • Symantec Internet Security Threat Report: Trends for 2008

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • IT Budget Strategy in a Down Economy: Stop Buying Storage!

    With the current downturn in today's economy, organizations are reluctant to spend any more money than absolutely necessary. Read this paper to learn how Symantec is uniquely able to deliver products and solutions with the immediate ROI that the current financial situation demands.

  • Data Loss Prevention Survey

    Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.

  • Control Compliance Suite Trialware

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • Symantec Internet Security Threat Report

    The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.

  • Best Practices: Backing Up VMware with Veritas NetBackup

    As there are many ways of using VMware technology, there are just as many methods available for protecting this innovative technology. System administrators and IT technologists can use this paper to determine one of three recommended solutions for protecting VMs. Each of these technologies has relative advantages and disadvantages.

  • IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4

    With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

  • 7 Requirements of Data Loss Prevention

    This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.

  • Symantec Endpoint Protection 11.0.3

    In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  • Symantec IT Compliance Solution

    Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.

  • Business Value Analysis Study: Citizens Business Bank

    As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.

  • NetBackup Solutions for VMware

    It is critical to choose the right data protection solution, one that is complete, one that not only protects the physical world, but is also finely tuned for the virtual world. The current release of NetBackup delivers award winning solutions for VMware.

  • Best Practice for NDMP Backup Veritas NetBackup

    Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol.

  • Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5

    Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.

  • e-Book: Chapter 6 - Ten Hidden E-Discovery Hazards

    This paper explains Ten hidden e-discovery hazards reviewing everything from databases and storage to instant messages and smartphones which can help ward off e-discovery surprises.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.