Symantec Whitepapers


Sort by: Date | Company | Title


Symantec Business Data Protection Kit
By Symantec | 24/10/2014
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Download this now


Symantec Business Data Protection Kit
By Symantec | 24/10/2014
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Download this now


Symantec 2014 Internet Security Threat Report
By Symantec | 14/10/2014
The 2014 Internet Security Threat Report highlights the developments in cyber-crime in the last year and provides an analysis in global threat activity. Highlights from the report are: • Hackers continuing to attack PCs, as well as mobile devices, security cameras, routers and more • The number of data breaches has risen 62% from 2013, identity breaches up 493% • Ransomware attacks rose 500% and have evolved into more vicious assaults
Download this now


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
Download this now


Infographic: Phishing. Who’s being targeted?
By Symantec | 14/10/2014
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Download this now


Top 10 Tips for Cyber Resilience
By Symantec | 22/5/2014
Presented in the form of the top 10 tips for cyber resilience, this whitepaper provides a simple, easy to digest guide for enterprise on how best to secure your business against cyber risk and threats.
Download this now


Internet Security Threat Report 2014
By Symantec | 22/5/2014
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
Download this now


A Manifesto for Cyber Resilience
By Symantec | 22/5/2014
With the growing transition to a more online existence, users need to be more conscious about leading and protecting our online identity. This Manifesto sets out a plan to reduce the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Download this now


The Evolution and Value of Purpose-Built Backup Appliances
By Symantec | 5/12/2013
Customers today are still grappling with subpar backup performance as systems outstrip the allotted backup window time. Strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms have started to embrace more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This white paper explores the measurable benefits of PBBA systems for customers, with a focus on the increased use and adoption patterns of both integrated and targeted systems.
Download this now


Robust Data Protection Solutions for Virtual Environments
By Symantec | 5/12/2013
Organisations face a juggling act with the need to improve backup and recovery, increase server virtualization, manage data growth, while remaining in operation. Virtualization has complicated the protection landscape, as protecting virtual environments can be a challenge, especially as VMs are quickly and easily created, moved, and deleted in data centres and in the cloud. This white paper explores how new backup systems have been invigorated with future-proof functionality aimed at today’s virtualized environments, offering the backup “fountain of youth”.
Download this now