Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

The complexity and challenges of today's cyber security environment demand a coherent and unified security platform that carefully balances the awareness of internal and external risks. Look at how Symantec can help you achieve this perfect balance ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Myths, perceptions and outright lies in IT have persisted over the years, many upheld as truth without question. "That's how it's always been done" can't defend an IT decision that negatively impacts the image, health or ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Today's mobile users rely heavily on mobile applications to stay productive and every user needs a different suite of apps to create, consume and deliver the content they need. The IT community has long considered locked down mobile devices more ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
The Symantec Technology and Response (STAR) experts will provide a detailed, data-driven threat telemetry analysis into undetected targeted attacks that have hit enterprises over the past months, revealing the methods these attackers used to target their ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Out-of-control unstructured data growth creates all kinds of storage management, information security and compliance problems. Learn how you can design a successful data governance strategy thanks to Information Fabric. You'll also discover how ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Business continuity is a broad and challenging topic. It starts with the ability to protect sprawling data, meet basic service level agreements and stop security threats. But you also have to maintain that continuity as you embrace virtualization, cloud ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Organizations face many new security challenges as their data centers become highly virtualized and increasingly software-defined. An in-depth explanation of how Symantec Data Center Security solutions can meet the security and compliance needs in your ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
As the security threat landscape continues to evolve and increase in sophistication, unknown and zero-day malware poses serious risks to all kinds of organizations. In that world, you need to continuously enhance the level of protection that you offer ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Are you moving quickly toward a highly virtualized, software-defined data center model? A crash course on what you need to know as a NetBackup Administrator. In one quick hour, you'll get a rapid-fire rundown of the important topics and ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
The new Backup Exec 2014 offers a host of important new data protection options nad capabilities for your virtual environments. An overview of these new capabilities and what they mean for your organization. You'll also receive a sneak peek into how ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments