One fine body…
- Mountain View,CA, United States
- Industry Technology / Software / Internet
- Website www.symantec.com
- About Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.
archiving backup backup and recovery cloud cloud storage data loss prevention data protection deduplication disaster recovery ediscovery encryption enterprise vault malware mobile security netbackup phishing recovery security small business smb spam storage storage foundation storage management symantec virtualization more…
2012 state of information report 2013 accidental entrepreneur acquisition advanced persistent threats altiris android antispam antivirus appliance application availability application security applicationha apps apt archiving authentication availability backup backup and recovery backup appliance backup exec backup exec system recovery backupandrecovery backupexec best practices big data bot botnet botnets brightmail budgeting business continuity byod captcha carbon footprint carriers cell channel channel partners chargeback chargebacks clearwell clearwell systems cloud cloud computing cloud disaster recovery cloud security cloud sharing cloud storage cloudcomputing cluster file system cluster server clustering code signing commandcentral communication service provider communication service providers compliance consumerization of it contest corporate responsbility cost of a data breach critical infrastructure critical infrastructure protection custom mobile applications cyber attack cyber attacks cyber security cyber security awareness month cyber threats cyberattack cyberattacks cybercrime cybercrime cyber attacks cybersecurity data access governance data breach data breaches data center data governance data insight data leak data leakage data loss data loss prevention data management data privacy data protection data reclamation data retention databreach datacenter datainsight dataleak ddos deduplication defensible deletion digital information index disaster preparedness disaster recovery disaster recovery advisor disasterrecovery discovery and retention management dlp dmp dr dynamic multi-pathing dynamic multipathing ediscovery electronically stored information email email security email threats encryption endpoint endpoint management endpoint protection endpoint security endpoint threats energy energy savings enterprise enterprise mobility enterprise storage software enterprise vault enterprise vault discovery collector enterprise vault.cloud enterprisesecurity esi ev ev.cloud failover faq february file sharing filestore financial services finra firewall forrester study fraud online pc doctors google hangout governance green it guardianedge ha ha/dr hackers hana hangout hanzo high availability holidays hybrid cloud hydraq identity theft im incident response plan industrial control systems information information costs information governance information growth information management information protection information retention information sprawl informationmanagement informationtechnology infrastructure-as-a-service insider threat intant messaging intellectual property protection intelligence report internet safety internet security internetsecurity intrusion prevention investor ios ip theft ipad data protection it it compliance it governance risk and compliance it grc it spending key management kids online legal hold linux mac malware malicious attacks malicious code malware mam managed service providers management mdm messaging security microsoft microsoft azure migration mobile mobile application management mobile applications mobile apps mobile computing mobile device mobile device management mobile devices mobile dlp mobile malware mobile management mobile security mobile strategy mobile threats mobilecon 2013 mobility nas appliance netapp netbackup netbackup 5000 netbackup cloud storage nirvanix norton office 365 online family safety online safety online security onlinefamilynorton operations manager osterman parental controls partners partners backup performance pgp phishing phone phone support platform-as-a-service plc policies polymorphic malware ponemon predictions private cloud protection public cloud recovery red hat replication reputation-based security research resiliancy retention risk management rogue antivirus rogue security software roguesoftware rsa rsa2010 scada scams scareware scavenger hunt security security awareness training security management security threats server management server virtualization service providers small and medium size businesses small business small- and mid-sized business smart devices smartphone smartphones smb smbs snapshots social engineering social media social networking social networks socialware software-as-a-service spam spam bots specializations ssl state of the data center stateofthedatacenter storage storage and availability management storage appliance storage foundation storage foundation and cluster server for windows storage foundation for databases storage i/o storage management storage utilization strategy strong authentication stuxnet survey sustainability symantec symantec authentication symantec intelligence report symantec o3 symantec storage veritas cluster clusterserver sto symanteccloud symanteco3 systems management tablets targeted attacks tech support telecommunications thin provisioning threat landscape threat protection threats tool kit tracking cookie trends trust twebot twitter ubiquity unstructured data url shortening vars vector machine learning verisign verisign authentication veritas veritas cluster server veritas operations manager veritas storage foundation veritas storage foundation for oracle rac veritas storage foundation for sybase asc ce veritas storage foundation for windows veritas storage foundation ha for windows veritas volume replicator virtual machine virtualization virtualstore visibility vision vision scavenger hunt vmware vmware vsphere vmworld vulnerabilities watering hole attacks web 20 web security website security solutions well-meaning insiders windows windows 7 windows migration automation windows phone 7 zero-day zero-day exploit zero-day vulnerability …less
- Follow Following