Symantec Whitepapers


Sort by: Date | Company | Title


Authentication Solutions Buyer's Guide
By Symantec | 14/11/2013

Authentication is the most visible security control for applications used by enterprises and their customers. Individuals who would like more details regarding strong authentication methods available today to secure access to corporate networks and enterprise or customer applications. Learn how your environment will dictate which method is right for you.

Download this now


Building Maturity and Experience in Successful Virtualisation Strategies
By Symantec | 14/3/2013

Current trends in the adaption and deployment of virtualisation suggest that as an organisation gains experience, each implementation requires a different technique. A stratified approach to a company’s long-term virtualisation and cloud computing strategy allows the right skills set to be built alongside the resolution of each scale and complexity issue presented. Read more to understanding where you are and how you can compare for the future.

Download this now


Appropriate Backup Applications for Accelerated Virtualisation Projects
By Symantec | 14/3/2013

As virtualisation increasingly becomes an investment priority, a recent EDG survey has found that the associated operating expense can easily become too high a hurdle. In this paper, leading IT organisations quantify the role of inappropriate data-protection as a large obstacle to a stable virtualisation implementation. Read more to find how to optimise your backup applications to meet the present protection requirements.

Download this now


Six Strategies That Lead to Business-Critical Virtualisation
By Symantec | 14/3/2013

While most organisations are able to virtualise the basic functions of its workplace, they can often hit a wall when moving beyond legacy systems to business-critical servers and applications. This report lists six proactive strategies that business specialists have cited as assisting in building a virtualised state. Find out how these strategies lead to organisations becoming the beneficiary to virtualisation.

Download this now


Securing the Road to Virtualization and Beyond
By Symantec | 14/3/2013

Traditional security controls for enterprise don’t necessarily translate into the new world of virtualisation and cloud environments. When mapping out a secure virtualisation roadmap, click to find out about pave a more secure, risk free path.

Download this now


Securing the Virtual Data Centre
By Symantec | 14/3/2013

Virtual environments need protection from top to bottom – spanning hypervisors, management consoles, and physical hosts, not just endpoints – and end to end, across these sprawling, dynamic new infrastructures. This report includes field-proven examples of how best to safeguard critical applications in growing virtual and cloud environments.

Download this now


Case Study: Virtualising Wotif.com and Their Infrastructure
By Symantec | 14/3/2013

After a series of acquisitions, the online travel booking business Wotif.com was running seven data centres – each with their own policies. While consolidating their environments into one, it needed have the ability to it’s protect data and endpoints in a heterogeneous environment. Find out the company met its needs whilst making a six figure saving in its infrastructure costs.

Download this now


Tolly Report: Performance Survey of Virtual Environment Security
By Symantec | 14/3/2013

This report by Tolly tests the system resource requirements of competing vendor solutions when performing on-demand and on-access scanning functions, during distributed definition updates. Click to download how the four competing options ranked against each other.

Download this now


ESG Whitepaper: Integrated Computing Platform Survey
By Symantec | 11/3/2013

Data centres, servers, storage and more are being combined for simplified management and cost savings. In this survey, ESG looks at the current and future trends surrounding today’s integrated computing solutions. Download to find out how organisations are more likely to see commit IT budgets to the purchase of integrated solutions. Read more.

Download this now


ESG Whitepaper: Testing the claims of speed and volume
By Symantec | 11/3/2013

In this whitepaper, we look at today’s trends in evolving an enterprise’s data protection techniques beyond traditional daily and weekly backups. We also test both the speed and the volume of the current options available in improving backup and recovery. Read now.

Download this now