All Research Sponsored By:Symantec Corporation

Governance, Risk, Compliance: Policy Management Methods and Tools
EBOOK: IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.
Posted: 15 Dec 2009 | Published: 11 Dec 2009


Symantec Report on Rogue Security Software
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009


Presentation Transcript: The Other Green - Storage Efficiency and Optimization
PRESENTATION TRANSCRIPT: This session will look at various techniques and strategies to optimize either on-line active or primary as well as near-line or secondary storage environment during tough economic times, as well as to position for future growth, after all, there is no such thing as a data recession!
Posted: 06 Nov 2009 | Published: 25 Sep 2009


Presentation Transcript: Getting Set for e-Discovery
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
Posted: 06 Nov 2009 | Published: 06 Nov 2009


Presentation Transcript: Backup and Archive Are Not the Same Thing!
PRESENTATION TRANSCRIPT: Discover some of the challenges you'll face when compliance mandates a retention policy that just doesn’t make sense, and learn about some alternate solutions to backup and archiving you may not have considered yet.
Posted: 06 Nov 2009 | Published: 28 Sep 2009


eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity
EBOOK: Chapter 4 of this e-book gives advice on determining your email archiving goals and policies to establish a set of system features that match your company’s needs and boost archiving efficiency.
Posted: 09 Oct 2009 | Published: 01 Oct 2009


A Candid Examination of Data Deduplication
WHITE PAPER: Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available.
Posted: 24 Sep 2009 | Published: 11 Aug 2009


Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009


6 Steps to Prevent a Data Breach
BROCHURE: Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches.
Posted: 03 Sep 2009 | Published: 03 Sep 2009


Leveraging a Maturity Model to Achieve “Proactive Compliance”
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009


Symantec Protection Suite Challenge
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009


eBook-- Defining an Email-Archiving Policy
EBOOK: Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009


Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management
PRESENTATION TRANSCRIPT: Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.
Posted: 29 Jun 2009 | Published: 29 Jun 2009


Top Five Strategies for Getting an Email Archiving Project off the Ground
DATA SHEET: Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of an email archiving system.
Posted: 26 Jun 2009 | Published: 15 Jan 2008


Top Five Ways to Improve E-Discovery with Archiving
DATA SHEET: Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Posted: 26 Jun 2009 | Published: 21 Jan 2008


Symantec Protection Suite Enterprise Edition
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009


5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
WHITE PAPER: Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
Posted: 11 Jun 2009 | Published: 11 Jun 2009


Web Based Attacks
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009


Top Benefits of Symantec Protection Suite
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009


Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
PRESENTATION TRANSCRIPT: This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
Posted: 09 Jun 2009 | Published: 06 May 2009


Symantec Internet Security Threat Report: Trends for 2008
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009


IT Budget Strategy in a Down Economy: Stop Buying Storage!
WHITE PAPER: With the current downturn in today's economy, organizations are reluctant to spend any more money than absolutely necessary. Read this paper to learn how Symantec is uniquely able to deliver products and solutions with the immediate ROI that the current financial situation demands.
Posted: 17 Apr 2009 | Published: 15 Jan 2009


Data Loss Prevention Survey
ASSESSMENT TOOL: Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
Posted: 02 Apr 2009 | Published: 02 Apr 2009


Control Compliance Suite Trialware
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009


Symantec Internet Security Threat Report
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008