Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

    LinkedIn SlideShare
  • Slideshare-64x64 Home
  • Explore
  • Search
    • You
  • Upload
  • Login
  • Signup
  • Home
  • Explore
  • Presentation Courses
  • PowerPoint Courses
  • by LinkedIn Learning
×
×
×
×
×
×

Symantec

Symantec
  • Following Follow   Processing…
  • 457 SlideShares
  • 7,167 Followers
  • 0 Clipboards

Modal header

One fine body…

    • Mountain View, CA, United States
  • Industry Technology / Software / Internet
  • Website www.symantec.com
  • About Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.
TwitterFacebookLinkedIn
Followers (7,167)
  • Mathieu KONAN
  • ahmadsafirun
  • Yarzar Sein Win
  • Chantal Chung
  • Kirti Deshmukh
  • zahernourredine
Tags (593)

backup backup and recovery backup exec business continuity cloud security cyber attack cyber attacks cyber resilience cyber threats cybercrime cybersecurity data breach data loss prevention data protection disaster recovery endpoint security endpoint threats internet security malware mobile malware mobile security netbackup security symantec trend micro virtualization more…

#regin #symantec #bashbug #cybercrime #cybersecurity 2012 state of information report 2013 2fa 3d accidental entrepreneur acquisition active directory advanced persistent threats advanced threat protection agile data center altiris amazon android android malware antispam antivirus app wrapping apple appliance application availability application management application security applicationha apps apt archivage archiving atp attaque authentication availability aws backup backup and recovery backup appliance backup complexity backup exec backup exec 15 backup exec appliance backup exec system recovery backup scalability backup/recovery backupandrecovery backupexec backupexec 2014 banking banking malware bare metal recovery bashbug best practices big data biometrics bitcoin bmw bot botnet botnets breach notification brightmail bring your own device budgeting business continuity byod caas captcha carbon footprint carriers cdot cell channel channel partners chargeback chargebacks cio cisco ciso citrix clearwell clearwell systems cloud cloud backup cloud based cloud computing cloud disaster recovery cloud security cloud sharing cloud storage cloudcomputing cluster file system cluster server clustering code signing commandcentral communication service provider communication service providers commvault compl compliance computing conformité informatique conformité règlementaire consumerization of it contest converged solutions corporate responsbility cost of a data breach cost of a hack crise critical infrastructure critical infrastructure protection cryptocurrency cryptography cso cto custom mobile applications cyber cyber attack cyber attacks cyber insurance cyber r cyber resilience cyber security cyber security awareness month cyber tech israel cyber threat cyber threats cyberattack cyberattacks cybercrime cybercrime cyber attacks cybersecurity cybersécurité cybertech16 cyod data access governance data breach data breaches data center data center protection data explosion data governance data insight data leak data leakage data loss data loss prevention data management data orchestration data privacy data protection data reclamation data resiliency data retention data storage data visibility databreach datacenter datainsight dataleak ddos dedupe deduplication defensible deletion denial-of-service attack difficulty around enterprise backup digital digital information index disaster preparedness disaster recovery disaster recovery advisor disasterrecovery discovery and retention management dlp dmp dr dridex dsi dynamic multi-pathing dynamic multipathing ediscovery education edward snowden electronically stored information email email security email threats emea emm encryption endpoint endpoint management endpoint protection endpoint security endpoint threats energy energy savings enter enterprise enterprise backup and recovery enterprise mobility enterprise mobility management enterprise mobility risks enterprise storage software enterprise vault enterprise vault discovery collector enterprise vault.cloud enterprisesecurity esi eu gdpr eu general data protection regulation europe ev ev.cloud failover faq february federal government file sharing filestore finance financial financial services finra firewall flash forrester forrester study forrester white paper fortinet fraud online pc doctors freak gdpr google hangout governance green it guardianedge ha ha/dr hack hackers hana hangout hanzo healthcare high availability higher education himss hippa holidays hybrid cloud hydraq hyper-v identity identity theft im incident response plan increased backup performance industrial control systems infographic information information costs information governance information growth information management information protection information retention information security information sprawl information technology informationmanagement informationtechnology infrastructure-as-a-service inside theft insider threat insurance intant messaging intel intellectual property intellectual property protection intelligence report inter internet internet of things internet safety internet security internetsecurity intrusion prevention investor ios iot ip theft ipad data protection istr it it compliance it governance risk and compliance it grc it management it spending jeep jot kaspersky key management kids online legacy legacy systems legal hold linux local government mac mac malware machine learning malicious attacks malicious code malware malware analysis mam man-in-the-middle attack managed service providers management mdm messaging security mic microsoft microsoft azure microsoft exchange server microsoft sharepoint microsoft sql migration mo mobi mobile mobile application management mobile applications mobile apps mobile computing mobile device mobile device management mobile devices mobile dlp mobile malware mobile management mobile security mobile security. mobility protection mobile strategy mobile threats mobile world congress mobilecon 2013 mobility mobility risks morpho butterfly android malware msp mwc nas appliance national cyber security awareness month ndmp netapp netbackup netbackup 5000 netbackup 5230 netbackup 5330 netbackup 7.6 netbackup appliance netbackup cloud storage netbackup head to head network nirvanix nist norton nsa nsx office 365 online family safety online safety online security onlinefamilynorton operations manager oracle osterman p2v palo alto networks parental controls partners partners backup passwords patch management pbba pbbr performance pgp phishing phone phone support platform-as-a-service plc point of sale policies polymorphic malware ponemon pos predictions privacy private cloud protection public cloud quantum ramnit ransom ware ransomware raspberry pi reco recovery red hat regin regulations replication report reputation-based security research resiliancy retail retention risk management risque riverbed rogue antivirus rogue security software roguesoftware rsa rsa2010 rssi s3 and storage saas san scada scalability scams scareware scavenger hunt sddc secondary education secur security security awareness training security intelligence security management security threats server management server virtualization service providers shellshock shellshocked simple storage service small and medium size businesses small business small- and mid-sized business smart devices smartphone smartphones smb smbs snapshots social engineering social media social networking social networks socialware software-as-a-service sophos source code spam spam bots spear phishing spear-phishing specializations spiceworks ssd ssl state government state of the data center stateofthedatacenter storage storage and availability management storage appliance storage foundation storage foundation and cluster server for windows storage foundation for databases storage i/o storage management storage types storage utilization strategy strong authentication stuxnet survey sustainability symantec symantec application services symantec atp symantec authentication symantec backup and recovery symantec data center security symantec endpoint protection symantec endpoint protection security symantec intelligence report symantec mobility: application management symantec o3 symantec storage veritas cluster clusterserver sto symantec threat protection symanteccloud symanteco3 systems management sécurité tablets targeted attacks tech support technology telecommunications the internet of things thin provisioning threat landscape threat protection threats tool kit tracking cookie trend micro trends trojans trust twebot twitter two factor authentication ubiquity ubuntu unitrends unstructured data url shortening vars vcenter vector machine learning veeam verisign verisign authentication veritas veritas cluster server veritas operations manager veritas storage foundation veritas storage foundation for oracle rac veritas storage foundation for sybase asc ce veritas storage foundation for windows veritas storage foundation ha for windows veritas volume replicator virtual machine virtual volume virtual volumes virtualization virtualstore visibility vision vision scavenger hunt vmware vmware vsphere vmworld vtl vulnerabilities vulnerability vulnérabilité watering hole attacks wearables web 20 web security website website security solutions website traffic well-meaning insiders what's yours is mine white paper windocloud security windows windows 7 windows 8 windows 8.1 windows migration automation windows phone 7 windows server 2003 wipro wirelucker world wide web zero-day zero-day exploit zero-day vulnerability …less

View all GDPR (12)

  • GDPR Breach Notification Demystifying What the Regulators Want GDPR Breach Notification Demy... by symantec 8 months ago
  • Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection, and Response Symantec Webinar Part 6 of 6 ... by symantec 10 months ago
  • Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross Border Data Transfer Symantec Webinar Part 5 of 6 ... by symantec 10 months ago
  • Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to Know Symantec Webinar Part 4 of 6 ... by symantec 10 months ago
  • Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for GDPR Compliance Symantec Webinar Part 3 of 6 ... by symantec 10 months ago
  • Symantec Webinar Part 2 of 6 GDPR Compliance Symantec Webinar Part 2 of 6 ... by symantec 10 months ago
  • Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness Symantec Webinar Part 1 of 6 ... by symantec 10 months ago
  • Symantec - State of European Data Privacy Symantec - State of European ... by symantec 2 years ago

View all Security (115)

  • Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Tackle Unknown Threats with S... by symantec 1 year ago
  • Building Trust; best practics for protecting data in the cloud Building Trust; best practics... by symantec 2 years ago
  • Cyber Criminals Responsible for the Biggest Attacks Cyber Criminals Responsible f... by symantec 2 years ago
  • Spear-Phishing Attacks: One Click Can Change Everything Spear-Phishing Attacks: One C... by symantec 2 years ago
  • Securing Office 365 Securing Office 365 by symantec 2 years ago
  • Healthcare IT Security And Risk Management Study Healthcare IT Security And Ri... by symantec 2 years ago
  • Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security Get Your Head in the Cloud: A... by symantec 2 years ago
  • Thinking of choosing Sophos? Thinking of choosing Sophos? by symantec 3 years ago

View all Mobility (18)

  • Top Risks of Enterprise Mobility Top Risks of Enterprise Mobility by symantec 3 years ago
  •  Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Wor... by symantec 4 years ago
  • The Forrester Wave™: Enterprise Mobile Management, 3. Quartal 2014 The Forrester Wave™: Enterpri... by symantec 4 years ago
  • The Forrester Wave™: Enterprise Mobile Management, 3° trimestre 2014 The Forrester Wave™: Enterpri... by symantec 4 years ago
  • Forrester Wave™: Gestion de la mobilité d'entreprise, Q3 2014 Forrester Wave™: Gestion de l... by symantec 4 years ago
  • The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014 The Forrester Wave™: Enterpri... by symantec 4 years ago
  • The Forrester Wave™: Enterprise Mobile Management Q3 2014 The Forrester Wave™: Enterpri... by symantec 4 years ago
  • Norton Mobile Apps Survey Report Norton Mobile Apps Survey Report by symantec 4 years ago

View all Backup and Recovery (72)

  • Why Backup Exec for Virtualization? Why Backup Exec for Virtualiz... by symantec 3 years ago
  • Veritas Resiliency Platform Veritas Resiliency Platform by symantec 3 years ago
  • Future of backup Future of backup by symantec 3 years ago
  • ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance ESG Labs Testing and Performa... by symantec 3 years ago
  • Backup Exec 15 Tuning and Performance Guide Backup Exec 15 Tuning and Per... by symantec 3 years ago
  • Symantec Backup Exec 15 Administrator's Guide Symantec Backup Exec 15 Admin... by symantec 3 years ago
  • TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015 TECHNICAL PRESENTATION: Upgra... by symantec 3 years ago
  • TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations TECHNICAL BRIEF▶ Backup Exec ... by symantec 3 years ago
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • About
  • Developers & API
  • Blog
  • Terms
  • Privacy
  • Copyright
  • Support
LinkedIn Twitter Google+ Facebook RSS Feeds LinkedIn Corporation © 2019