Symantec Whitepapers


Sort by: Date | Company | Title


Top 10 Tips for Cyber Resilience
By Symantec | 22/5/2014
Presented in the form of the top 10 tips for cyber resilience, this whitepaper provides a simple, easy to digest guide for enterprise on how best to secure your business against cyber risk and threats.
Download this now


Internet Security Threat Report 2014
By Symantec | 22/5/2014
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
Download this now


A Manifesto for Cyber Resilience
By Symantec | 22/5/2014
With the growing transition to a more online existence, users need to be more conscious about leading and protecting our online identity. This Manifesto sets out a plan to reduce the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Download this now


The Evolution and Value of Purpose-Built Backup Appliances
By Symantec | 5/12/2013
Customers today are still grappling with subpar backup performance as systems outstrip the allotted backup window time. Strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms have started to embrace more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This white paper explores the measurable benefits of PBBA systems for customers, with a focus on the increased use and adoption patterns of both integrated and targeted systems.
Download this now


Robust Data Protection Solutions for Virtual Environments
By Symantec | 5/12/2013
Organisations face a juggling act with the need to improve backup and recovery, increase server virtualization, manage data growth, while remaining in operation. Virtualization has complicated the protection landscape, as protecting virtual environments can be a challenge, especially as VMs are quickly and easily created, moved, and deleted in data centres and in the cloud. This white paper explores how new backup systems have been invigorated with future-proof functionality aimed at today’s virtualized environments, offering the backup “fountain of youth”.
Download this now


Is your data centre growing too complex for your backup?
By Symantec | 5/12/2013
Backing up data today is growing more complex - and in an era of virtualisation, big data and cloud deployments, it can be difficult to maintain control over your data, resulting in loss and downtime. This hour-long webcast features expert commentary on navigating the complexity of backing up a heavily virtualised infrastructure; simplifying your backup software and hardware ecosystem; reducing the cost of backing up your organisation’s data, and modernising your backup infrastructure with integration. The presentations will conclude with an interactive Q&A session.
Download this now


Authentication Solutions Buyer's Guide
By Symantec | 14/11/2013
Authentication is the most visible security control for applications used by enterprises and their customers. Individuals who would like more details regarding strong authentication methods available today to secure access to corporate networks and enterprise or customer applications. Learn how your environment will dictate which method is right for you.
Download this now


The Business Case for Better Disaster Recovery
By Symantec | 23/5/2013
With many backup and recovery strategies not keeping up with rampant data growth and increasing migration to virtual environments, many in-house IT budgets are stretched to breaking point. This whitepaper outlines the best practice in delivering a backup strategy that is efficient, effective and affordable. Click to download!
Download this now


Finding the Perfect Virtualised Fit
By Symantec | 23/5/2013
Virtualisation is never ‘a once size fits all’ proposition. Particularly for SMBs who are looking for third-party solutions, there is no shortage of vendors offering solutions. This whitepaper is a how-to guide for identifying what you need and how to determine which solution would deliver the perfect fit for your organisation. Click to download!
Download this now


Backup and Recovery: Will Virtualisation Work?
By Symantec | 23/5/2013
Can an organisation’s backup and recovery strategy keep pace with rampant virtualisation. With possible untamed data growth, data management problems are increasingly compounded, leaving a strategy with possible points of weakness. Read how to deliver a solution that is both cost effective and minimises possible business downtime.
Download this now

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?