All Research Sponsored By:Symantec Corporation
-
Best Practices for Windows Vista Planning, Migration, and Ongoing Management
It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
-
Symantec Mail Security for SMTP 5.0
This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
-
Symantec Mail Security for SMTP
Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
-
Symantec Internet Security Threat Report
This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
-
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
-
Mail Security for Microsoft Exchange Server
This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
-
New Veritas Storage Foundation: Powerful and Free
Discover the benefits of Symantec's free new software additions to the Veritas Storage Foundation. In this quick overview, you will be introduced to the benefits, capabilities and overall strategy behind these two new resources.
-
Cost-effective High Availability with Veritas Cluster Server
High application availability can be achieved through the use of larger clusters; an approach that also results in increased server utilization and reduces costs. Learn about advanced cluster configurations that can improve application availability.
-
El Camino Hospital: High Availability and Disaster Recovery Solutions from Symantec Saves Costs and Revenue
A couple years ago the hospital turned to VERITAS Consulting for help in designing and implementing a high availability infrastructure based on VERITAS Cluster Server and VERITAS Storage Foundation.
-
LogicaCMG: Making the Call for Automated Server Provisioning Solution from Symantec
LogicaSMG selected VERITAS OpForce software from Symantec to automate server provisioning and to provide Web-based remote management of its server environment.
-
Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
-
Veritas NetBackup Operations Manager and Veritas Backup Reporter - Backup/Recovery Management and Reporting
Storage volumes are expanding with no apparent limit, while backup and recovery processes grow steadily more complex. Navigate the new product landscape and identify key issues needed to address balance efficiency and risk in your backup environment.
-
Enterprise Messaging Security and Management
Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
-
Symantec IM Manager
Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
-
Best Practices for Protecting Microsoft Exchange
The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
-
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
-
Secure Optimized Data Protection for Remote Offices
Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.