Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Symantec Vision

Results for Symantec Vision

There is a thriving underground economy that provides easy access to services, tools and tricks nearly anyone can use to launch a career as a cybercriminal. In this session, you will get an insider's view of how cybercriminals operate and gain ...
Article by Swathi Turlapaty | 13 May 2014 | 1 comment
The evolution and increasing prevalence of targeted attacks means endpoint protection must adapt for the future. Attend this session to review key shifts in endpoint protection as it moves beyond antivirus to a more sophisticated layered approach to ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Successful backup is all about recovery--how fast you can get your data back and how much time and productivity you'll lose. In this session, you'll examine the recovery ...
Video by LeslieMiller | 13 May 2014 | 1 comment
The Nexus of Consumerization, Cloud, Mobility and Social are forcing fundamental changes in IT departments, IT infrastructure and information security. Neil MacDonald, VP and Gartner Fellow will discuss the need for fundamental mindset changes in ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Symantec's mobility strategy is designed to address your challenges with an integrated solution rather than a collection of different point solutions. This session will provide you with a detailed overview of Symantec's mbile vision and ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Building an effective mobility strategy may sound simple, but it can become a formidable task. To be successful, enterprise IT must partner with the right stakeholders to understand the objectives of each group and build a strategy that benefits ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
As smartphones and tablets have continued to make their way into the enterprise, the question of whether or not to allow these devices has become irrelevant. Instead, IT departments are looking for the best and safest ways to enable these devices with ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
The complexity and challenges of today's cyber security environment demand a coherent and unified security platform that carefully balances the awareness of internal and external risks. In this session, you will take a close look at how Symantec can ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Recent news stories indicate that government agencies may have the ability to decode Secure Sockets Layer (SSL) encrypted communications, which creates obvious privacy concerns for ...
Video by LeslieMiller | 13 May 2014 | 2 comments
For the last 20 years, security experts have exposed passwords as the Achilles heel of the Internet. Enterprises have struggled with the increased security risk, inhibited productivity and added costs of password management because they lacked a simpler ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments