All Research Sponsored By:Symantec Corporation
-
e-Book: Chapter 5 - Understanding the Data Collection Process
Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
-
e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
-
Symantec Internet Security Threat Report: Trends for July-December 07
This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
-
Best Practices for Backup and Recovery
Check out this Symantec webcast discussing best practices for backup and recovery
-
e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
-
Global Data Deduplication Results with NetBackup PureDisk
NetBackup PureDisk technology enables both client-based data deduplication to optimized bandwidth usage and target-based deduplication for storage optimization.
-
NetBackup Disk Based Data Protection Options
This paper explains the disk options and their capabilities as well as the other new features in NetBackup 6.5 that make up the Enterprise Disk Foundation, also it provides guidance in choosing the appropriate disk options for your environment.
-
Veritas NetBackup 6.5 for VMware 3.x: Best Practices
This paper covers best practices for designing solutions for--and protecting--VMware virtual machines.
-
e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff
This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.
-
System Recovery-Breaking through the Dissimilar Hardware Restore Challenge
This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware.
-
Symantec Backup Exec System Recovery 8: The Gold Standard in Complete Windows System Recovery
Symantec Backup Exec System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.
-
Best Practices for Archiving Lotus Domino Environments
This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
-
Symantec Protection Network and Online Backup: An Executive Overview
In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.
-
Getting Started with Online Storage for Backup Exec
In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.
-
NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection
Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments.
-
Global Data Deduplication Results with NetBackup PureDisk
At the heart of NetBackup PureDisk customers will find flexible deduplication technology, a highly scalable software-based storage system, and integration with NetBackup for greater functionality.
-
Veritas NetBackup 6.5: Designing and Implementing Backups Using Storage Lifecycle Policies
This paper looks at how these features relate to recovery service levels and how they can be deployed to help ensure that backup storage is used cost-effectively while still maintaining appropriate levels of recoverability.
-
Implementing Highly Available Data Protection with Veritas NetBackup
This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site.
-
Veritas NetBackup for Microsoft Exchange Server Solution Guide
Upon completion of reading this paper, the reader should be well positioned to describe available data protection solutions for Microsoft Exchange as provided by NetBackup, the NetBackup for Exchange Server agent, and the NetBackup Snapshot Client.
-
Veritas NetBackup 6.5 for VMware 3.x: Best Practices
This white paper describes tools designed for VMware environments to increase the efficiency and cost-effectiveness of IT operations. It covers best practices for designing solutions for-and protecting-VMware virtual machines.
-
Comprehensive SQL Server Data Protection with Symantec Backup Exec 11d
Choosing the proper backup and recovery plan for SQL Server can be a daunting task. Read this white paper and learn which model best suits your organization and can ease administration.
-
Symantec Backup Execâ„¢ System Recovery 7.0
Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations.
-
Archiving Lotus Domino for Storage Optimization and E-Discovery
Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
-
Advantages of Integrated Messaging Security
This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
-
Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.