WHITE PAPER:
Symantec Backup Exec System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.
WHITE PAPER:
This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
WHITE PAPER:
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
WHITE PAPER:
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
WHITE PAPER:
In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
WHITE PAPER:
It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
WHITE PAPER:
Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
WHITE PAPER:
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
WHITE PAPER:
This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
WHITE PAPER:
Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.