symantec com

Results 1 - 25 of 69Sort Results By: Published Date | Title | Company Name
Published By: Symantec Health     Published Date: Feb 08, 2011
Read this white paper to learn if cloud archiving translated into a good night's sleep, freeing them from worrying if their people were good stewards of patient and corporate data.
Tags : 
symantec health, cio, cloud archiving, corporate data, healthcare industry, cloud computing
    
Symantec Health
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, data center
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
Published By: Symantec.cloud     Published Date: Aug 03, 2011
Cloud-based archives offer the cost savings, ease of use, and scalability of the cloud coupled with best-of-breed security from a trusted provider for defensibly handling high-risk enterprise data. Download this whitepaper to find out more now!
Tags : 
messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas, convergence, network management, network security, disaster recovery, email security, identity management, intrusion detection, intrusion prevention, cloud computing
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : 
symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security, managed service, managed services, network security, email security software, managed email security, skeptic, email, email security solution, mta, convergence, network management, authentication
    
Symantec.cloud
Published By: Symantec     Published Date: Oct 19, 2012
Symantec Endpoint Protection 12.1 solution was compared to two implementations each from McAfee and Trend Micro. Testing encompassed various scanning and system update functions over virtual machines. Read on to figure out which performed best.
Tags : 
symantec, virtualization, virtual desktop, virtual machines, resources, performance, symantec endpoint protection, vmware, security, infrastructure
    
Symantec
Published By: Symantec     Published Date: Oct 25, 2012
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
symantec, security, best practices, endpoint security, security detection, security education
    
Symantec
Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security, security
    
Symantec
Published By: Symantec     Published Date: Nov 08, 2012
Results are in. Symantec Endpoint Protection rated best in independent, real-world tests recently published by Dennis Technology Labs. These tests are designed to more accurately reflect a simulated user environment.
Tags : 
virual environments, symantec, data security, malware, anti-malware products, security
    
Symantec
Published By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : 
endpoint protection, security, performance test, comparison, windows 8, anti spam, anti spyware, anti virus, auditing, authentication, business continuity, compliance, disaster recovery, email security, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
endpoint protection, security, best practices, survey, anti spam, anti spyware, anti virus, application security, business continuity, disaster recovery, email security, encryption, security management, vulnerability management
    
Symantec
Published By: Symantec.cloud     Published Date: May 11, 2012
The Symantec 2012 Endpoint Security Best Practices Survey reveals that organizations employing best practices are enjoying dramatically better outcomes when it comes to endpoint protection, and many of these best practices can-and should-be leveraged by SMBs.
Tags : 
symantec, cloud, endpoint security, technology, smb, protection, security management, data protection, data quality, database security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: May 11, 2012
Powerful backup and flexible deployment options, including enhanced software, backup appliances, and backup solutions in the cloud, offer flexibility and choice in how you manage backup, allowing you to deploy a modern infrastructure that best suits your IT requirements, business needs, and environment. But how do you know which backup strategy is right for your business? Read this whitepaper to better understand which deployment option could best suit your needs.
Tags : 
symantec, cloud, computing, technology, recovery, backup, solutions, security management, security policies, data protection, data quality
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper, Symantec offers seven tips for how business owners can beef up and protect their company.
Tags : 
it security, smb, symantec, data security, disaster recovery, backup and recovery, security solutions, security, data management, data center
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance, business continuity, policy based management, security policies, risk management, information management
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, california edition, email security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition, email security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition, email security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, massachusetts edition, email security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, michigan edition, email security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, nevada edition, email security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, washington edition, email security, internet security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Jul 08, 2010
Make informed decisions about archiving requirements in your business.
Tags : 
messagelabs symantec, hosted email archiving, data storage, security, search and retrieval, cloud computing, storage management, security management, email archiving
    
Symantec.cloud
Start   Previous   1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.