All Research Sponsored By:Symantec Corporation

Website Security Threat Report, Part Two
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013


Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013


Protecting Your Website With Always On SSL
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012


Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them
WHITE PAPER: This comprehensive white paper explores six threats to your website and provides a solution for how you can prevent them.
Posted: 10 Sep 2013 | Published: 30 Apr 2013


Symantec Website Security Threat Report
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013


Symantec Intelligence Report - June 2013
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013


PassMark Report: Enterprise Endpoint Security Performance Benchmarks
ANALYST REPORT: This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.
Posted: 29 Jul 2013 | Published: 30 Nov 2012


Symantec Intelligence Report – May 2013
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013


Symantec Internet Security Threat Report
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013


What to Look For in a Data Protection Solution for Virtual Environments - Data Sheet
WHITE PAPER: This three page white paper provides you with four "must have" features to consider ensuring your backup and recovery solution provides the best data and system protection for any virtual environment.
Posted: 12 Jun 2013 | Published: 30 Sep 2012


Agent vs Agentless VM Backup and Recovery - Data Sheet
WHITE PAPER: This brief paper condenses the confusion of what a backup agent is or does with unbiased information so you can make the right choice for your environment. Check out each method now highlighting the pros and cons of each so you can make informed decisions without any distractions.
Posted: 11 Jun 2013 | Published: 31 Oct 2012


State of the Data Center Survey
WHITE PAPER: Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.
Posted: 31 May 2013 | Published: 31 May 2013


Veritas Cluster Server from Symantec
WHITE PAPER: This resource discusses a cluster server platform that ensures high availability and disaster recovery for the most critical applications.
Posted: 29 May 2013 | Published: 31 Oct 2012


Cloud Disaster Recovery: Practical Applications and Pointers for the SMB
EGUIDE: This expert guide from SearchStorage.com discusses how cloud-based services can simplify and streamline your disaster recovery and outlines key phases of the DR planning process.
Posted: 24 May 2013 | Published: 24 May 2013


How iOS Encryption and Data Protection Work
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013


SMB cookbook: Whipping up a virtualization disaster recovery plan
EGUIDE: This exclusive E-Guide explores how to implement a successful virtualization DR plan for the growing needs and shrinking budgets of today's IT departments.
Posted: 14 May 2013 | Published: 14 May 2013


BYOD Security Policy, not MDM, at Heart of Smartphone Security
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013


Cloud Backup: Terms and Trends
EGUIDE: This expert E-Guide recaps the results of a recent cloud backup survey and reports on your peers' experiences and satisfaction with it. It also examines how cloud backup fits into the broader cloud storage ecosystem and clears up some confusion around semantics.
Posted: 14 May 2013 | Published: 14 May 2013


Agent based vs host based virtualization backups: has the market shifted?
EGUIDE: This E-Guide provides insight into the evolution of data protection for virtual environments and reveals how host-based virtualization backups used to be king, but agent-based approaches are now catching on.
Posted: 13 May 2013 | Published: 13 May 2013


Virtual Data Center eZine: Backup Strategies for Virtual Servers
EZINE: This exclusive E-Zine explores some of the challenges surrounding virtualization and how to overcome them.  Find out about the various backup strategies for virtual servers, building a private cloud and how to gauge server resources for endpoint virtualization.
Posted: 10 May 2013 | Published: 30 Jun 2010


PassMark Success: Endpoint Protection
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013


2012 Endpoint Security Best Practices Survey Results
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013


Expert Video Tip Transcript: Today's Cloud Backup
PRESENTATION TRANSCRIPT: Access this exclusive Expert Video Tip transcript about current cloud backup options to explore a 10-question Chicago Storage Decisions 2012 Q&A with independent analyst Brien Posey. Read on to learn how cloud backup is being utilized across enterprises and get the scoop on various backup devices.
Posted: 11 Mar 2013 | Published: 11 Mar 2013


8 Questions to Ask Before Moving to the Cloud
EGUIDE: Access this exclusive SearchCloudStorage.com E-Guide to discover eight questions you should ask before deciding if cloud storage can satisfy your company's needs and learn about considerations you must keep in mind to best determine your organization's storage primary use case.
Posted: 01 Mar 2013 | Published: 01 Mar 2013


Cloud Endpoint Security: Considerations for Cloud Security Services
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013