BEAUTY Is in Thepackage Design & Source Productions

Total Page:16

File Type:pdf, Size:1020Kb

BEAUTY Is in Thepackage Design & Source Productions TheConfident SMB SMBIT As Your Business Enabler IT As Your Business Enabler >TheBEAUTY is in thePACKAGE Design & Source Productions AlSo >No More “Red Panic Button” >Messaging in a Bottle >Backup Leaps Forward ç Contents March/April 2010 Laura Tufariello, Kathia Toraño, Founder and Owner Accountant and IT Lead Confidence in a connected world. TheConfident ç SMB Contents Case Study No More “Red Panic Button” Founded in a downstairs room of 16 the home of founder Billy Wilson, Sandcroft Management Services understands entrepreneurship. With managed services from Vitality Consulting Services Limited and various Symantec technologies, Sandcroft is able to focus on In Every Issue 10 evolving and running its business. Cover Story By Patrick E. Spencer The Beauty is in the Package >16 The passion and attention to detail Design & Features Source Productions puts into its environmentally 23 Message in a Bottle sustainable products extend to its technology If you use email or instant Business Perspectives solutions with the help of Baroan Technologies messaging, your business is Deduplication: and Symantec data protection technologies. under attack every day—including It’s Everywhere! By Mark L.S. Mullins everything from spam to Thoughts and Analysis confidential messages leaving from Carine Clark >10 your organization, either >3 maliciously or accidentally. ThinkTank By Ken Downie >23 Find out what security trends will dominate in 2010, how cybercrime Backup leaps Forward is getting much easier, 29 New data protection technologies migrate to Windows 7 can help you not only avoid in seven easy steps, ç potential disasters but aid in EDIToRIAl TEAM reducing costs, saving time, and and more. Publisher and Editor in Chief Patrick E. Spencer, PhD Subscription Information boosting productivity. >4 Managing Editors Brian Heckert, Mark L.S. Mullins, Online subscriptions are free to individuals Dee V. Sharma, Donna Tarlton, who complete a subscription form at By Alan Drummer Courtenay Troxel http://go.symantec.com/theconfidentsmb- >29 Design Director Joy Jacob subscribe. For change of email address, Contributing Writers Ken Downie please send an email to Alan Drummer [email protected]. Mark L.S. Mullins Dee V. Sharma Privacy Policy Patrick E. Spencer Symantec allows sharing of our mail list in Web Producer Laurel Bresaz accordance with our corporate privacy Podcast Producer Jon Eyre policies and applicable laws. Please visit www.symantec.com/about/profile/policies/ < 2 > SYMANTEC Marketing privacy.jsp or write us at theconfidentsmb_ Chief Marketing officer Carine Clark [email protected]. Confidence in a connected world. Vice President James Rose TheConfident Business Perspectives Thoughts and Analysis from Carine Clark SMB Data Protection Data Deduplication: It’s Everywhere! ake no mistake about it: Most companies have duplicate data in two Information is the fundamental locations—on their primary storage, where they Mconnecting fabric of your store common information such as Microsoft business. You rely on information Office documents, and in their backup data. technology and systems to run your With deduplication you can reduce the amount Messaging Security business, drive new opportunities, of data you store for backup and recovery by increase revenue, and operate efficiently. as much as 90 percent. Equally important, this Yet the volume of information and its new technology reduces data in remote offices y continued growth is a challenge for companies and virtual server environments. of every size, especially for budget-constrained If you are just now considering deduplica- SMBs. During the next four years, IDC estimates tion—or even if you already have it—you may Case Stud that the digital universe will expand by 400 want to consider a more strategic approach to percent; however, IT budgets will expand just managing information overload. Put your data 20 percent and IT staffing 10 percent. You can’t storage on a diet. The feature “Backup Leaps y keep buying more disk or tape to store and back Forward!” delves into how you can tackle du- up this information because information growth plicate information, regardless of its location, continues to outpace IT expenditures for storage. with a single solution. This can reduce not only Stor Cover But there is a solution! It’s called dedupli- complexity and costs, but deliver more reli- cation. By compressing data and storing only able access to the information that drives your changes to the original data, deduplication is business. And that’s a direction you want your ç Contents about storing data only once. That can help you business to follow everywhere. reduce duplicate data everywhere, cut complex- ity, and shave IT infrastructure costs. Regards, s Carine S. Clark Video Chief Marketing Officer, Symantec Carine explains how to manage information overload with deduplication. < 3 > Confidence in a connected world. TheConfident ThinkTank SMB The Enduring Family Business Protection Data A Third of S&P 500 Companies are Family Businesses that Began Small with a Big Vision amily businesses are an often- or cannot be traded counterparts. overlooked form of ownership. inside and outside the According to FYet they are all around us—from family. McKinsey’s Messaging Security millions of small and midsize companies 3. Participation. analysis, the that underpin many economies to Families that average family household names such as BMW, participate actively business y Samsung, and Wal-Mart. A recent in company boards M&A deal was 1 McKinsey report finds that less than fare well. On average, 15 percent Case Stud 30 percent of family businesses survive 39 percent of board members in family smaller, but total value added— into the third generation of family businesses listed on the S&P 500 are measured by market capitalization ownership. However, those that do, tend inside directors, compared with 23 after the announcement—was 10.5 y to perform well over time compared percent in nonfamily companies. percent, compared with 6.3 percent for with their corporate peers. nonfamily counterparts. 4. Long-term perspective. Successful Stor Cover What are the attributes of family companies seek steady, long- 6. Philanthropy. Charity is an important a successful family business? term growth and performance, rather element in keeping families committed 1. Meritocracy. Successful businesses than short-term gains that avoid risking to the business, providing meaningful ç Contents that survive many generations have a the family’s wealth and control of the jobs for family members and promoting strong management ethos based on business. This also serves debt-holder family values for future generations. meritocracy. interests: family businesses tend to In the U.S., family-funded foundations 2. Control. Maintaining family control have lower financial leverage and cost of include 13 of the 20 largest players. while raising fresh capital is a major debt than corporate peers. For the full report, click here. source of potential conflict. Enduring 5. Value, not size. Family businesses 1 family businesses regulate ownership make smaller but more value-creating Christian Caspar, Ana Karina Dias, and Heinz-Peter Elstrodt, “The five attributes of enduring family issues—for example, how shares can M&A deals than their corporate businesses,” McKinsey Quarterly, January 2010. < 4 > Confidence in a connected world. TheConfident ThinkTank SMB SMBBEAT Protection Data Windows 7 Gains Momentum BBB launches FREE Data Security Guide for Small Business IT Professionals at Small Business Have Been Most Aggressive in Their Nearly 85 percent of data breaches Plans to Upgrade to Windows 7 occur at small businesses, accord- ing to a September 2009 report by recent Spiceworks’ VISA. Responding to this trend, the Messaging Security Intent to upgrade to Windows 7 within the first 90 days A Voice of IT report post-launch as measured by company size Better Business Bureau (BBB) has measures upgrade launched a free, customized educa- tion program called “Data Security— y plans and adoption Made Simpler” to help small busi- 1-19 42% sentiment on Windows ness owners develop and implement 7 before and after its effective data-security strategies. Case Stud 20-99 24% official debut. With Data security can sometimes be an results from over 1,500 100-249 22% overwhelming topic for small com- panies, and this program is designed y respondents, high- 250+ 28% to demystify the complexities of data lights from the report security tools. “While data breaches include: affect businesses of all sizes, many Stor Cover > The number of SMBs 01020304050 small business owners aren’t taking Source: Spiceworks, “Voice of IT report, Microsoft Windows 7 & SMBs: Speeding the necessary steps to create ongoing planning to adopt Up Adoption Rates,” January 2010. Windows 7 grew by 20 data security policies and practices, ç including training their employees,” Contents percentage after the official launch says Steve Cox, President and CEO > IT pros at the smallest firms (<20 employees) are upgrading the fastest, at of the Council of Better Business more than double the rate of larger organizations Bureaus. > The top two reasons for moving to Windows 7 were speed (73 percent) and user Developed in partnership with interface (69 percent) Symantec, VISA, Kroll’s Fraud Solu- tions, and NACHA—The Electronic > In the next 12 months, 45 percent of Windows 7 installations will be on new ma- Payments Association, the program chines, while 55 percent will be on existing machines For the complete report, click here. Continued on next page * < 5 > Confidence in a connected world. TheConfident ThinkTank SMB Data Protection Data Cybercrime Made Easy Continued from previous page SMBBEAT Do-it-yourself Kits Drive a Surge in Internet-Borne is presented by Kelley Drye ChannelWeb. Tested at Computer Infections Warren, LLP and Bryan the CRN Test Center lab, Cave, LLP. To learn more Symantec Endpoint Protec- o-it-yourself (DIY) kits are becoming big business in the cyber about this program, click tion Small Business Edition underworld, according to a recent report in USAToday.com.
Recommended publications
  • “Global Positioning Systems” GPS Mean Never Having to Say “I’M Lost”?
    APRIL 2003 VOLUME 19 NUMBER 4 PPCUGPPCUG NEWS A PUBLICATION OF THE PRINCETON PC USERS GROUP Monday April 14, 2003 “Global Positioning Systems” GPS mean never having to say “I’m Lost”? Don Arrowsmith will demonstrate the Garmin Street Pilot III Auto Navigation unit and the MapSource PC software. At Lawrence Library Meetng Rooms 1 & 2 US Route 1 South & Darrah Lane, Lawrenceville, NJ Meetings of an organization at any of the facilities of the Mercer County Library System in No Way implies endorsement of its programs In this issue About PPCUG............................................. 2 Presidents Message .................................. 2 Parcel Pick-up @TCF2003 ........................ 2 Backups-Lite .............................................. 3 New Year’s Resolutions ............................ 4 Member E-mail Directory .......................... 5 General Meeting Minutes ........ Back Cover Digital Photo by: Tom Carman Tom Digital Photo by: President Clarke Walker making his opening remarks to the group at the March general meeting. About PPCUG General Meetings Coming Events Second Monday of the month at the May 3 & 4, 2003 - Trenton Computer Festival Lawrenceville Library. Route 1 and Darrah Lane. May 12, 2003 - Lindow Operating System - Jim Russ 7:00-7:45 PM: Social Time / Tech Corner June 9, 2003 - Batch Files & Scripting - Vic Laurie 7:45 PM: Meeting Comes to Order 8 PM: Featured Presentation July 14, 2003 - Music & Video on Your PC - Don Slepian For information about upcoing meetings or joining PPCUG call 908-218-0778 to leave a message. Board Meetings Presidents Message For Meeting Location, Date and Time, call By: Clarke Walker 908-218-0778 Board meetings are open to All. I want to thank everyone who participated in last month’s “Digital Camera Show, Tell and Shoot”.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • Printmgr File
    2017 Annual Report Proxy Statement and Form 10-K FORWARD-LOOKING STATEMENT: This Annual Report contains forward-looking statements that are subject to safe harbors under the Securities Act of 1933, as amended and the Securities Exchange Act of 1934, as amended. Statements that refer to projections of our future financial performance, anticipated growth and trends in our businesses and in our industries, the actions we intend to take as part of our new strategy and the expected impact thereof, the anticipatedimpactsof our acquisitions and restructurings, our intent to pay quarterly cash dividends in the future, and other characterizations of future events or circumstances are forward-looking statements. These statements are only predictions, based on our current expectations about future events and may not prove to be accurate. We do not undertake any obligation to update these forward-looking statements to reflect events occurring or circumstances arising after the date of this report. These forward-looking statements involve risks and uncertainties, and our actual results, performance, or achievements could differ materially from those expressed or implied by the forward-looking statements on the basis of several factors, including those that we discuss in the “Risk Factors” section and throughout our 2017 Form 10-K, which is included in this Annual Report. We encourage you to read that section carefully. Two Year Summary of Selected Financial Data1 ($ in millions, except per share data) FY2017 FY2016 GAAP Financial Results Net revenue
    [Show full text]
  • Gartner's Magic Quadrant for Endpoint Protection Platform 2012
    Research G00219355 16 January 2012 Magic Quadrant for Endpoint Protection Platforms Peter Firstbrook, Neil MacDonald, John Girard Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools, such as vulnerability detection and application control, that reduce the attack surface. Market Definition/Description (This document was revised on 18 January 2012. The document you are viewing is the corrected version. For more information, see the Corrections page on gartner.com.) The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include: ■ Anti-malware ■ Anti-spyware ■ Personal firewalls ■ Host-based intrusion prevention ■ Port and device control ■ Full-disk and file encryption ■ Endpoint data loss prevention (DLP) ■ Application vulnerability management and application control These products and features are typically centrally managed and ideally integrated at the policy level. Despite the introduction of new players, the displacement of incumbents is still a significant challenge in the large-enterprise market. The biggest impact of the Magic Quadrant Challengers and Visionaries is to push the dominant market players into investing in new features and functionality (sometimes via acquisitions), and to keep pricing rational. However, in the sub-thousand-seat-level market, we do see more displacement, and buyers have more product choices due to lower management requirements. Current prices for comparable offerings are down from our last Magic Quadrant; 1-18TSGZT however, vendors are often substituting more-complete suite offerings with little or no increase in annual costs.
    [Show full text]
  • Veritas Backup Reporter 6.5 Clustering Guide Veritas Backup Reporter Clustering Guide
    Veritas Backup Reporter 6.5 Clustering Guide Veritas Backup Reporter Clustering Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™,
    [Show full text]
  • Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide
    Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.2 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2007 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™,
    [Show full text]
  • Symantec Corporation (Exact Name of the Registrant As Specified in Its Charter)
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 þ For the Fiscal Year Ended March 31, 2017 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 o For the Transition Period from to Commission File Number 000-17781 Symantec Corporation (Exact name of the registrant as specified in its charter) Delaware 77-0181864 (State or other jurisdiction of (I.R.S. employer incorporation or organization) Identification no.) 350 Ellis Street Mountain View, California 94043 (Address of principal executive offices) (zip code) Registrant’s telephone number, including area code: (650) 527-8000 Securities registered pursuant to Section 12(b) of the Act: Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: None (Title of class) Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes þ No o Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or 15(d) of the Exchange Act. Yes o No þ Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Corporate Review May 2009
    IT Security Products for Corporate Users Review of IT Security Suites for Corporate Users, 2009 Language: English May 2009 Last revision date: 2009-05-27 www.av-comparatives.org 1 Table of Contents The risk of malicious software 3 Management Summary 5 SPAM-Test 9 HIPS-Test 11 Product Review Section 13 AVIRA 14 ESET 29 G DATA 42 Kaspersky 54 SOPHOS 72 Symantec 85 TrustPort 97 Appendix A – Feature list & System Requirements 2 The risk of malicious software Most organizations are aware of the risk threatening their IT environment. Viruses, Trojans, Worms, Exploits and many others threats represent a serious risk for the IT department. A collapse of the IT systems could mean grave financial losses right up to insolvency for a com- pany. The IT departments of companies are conscious about this problem. Getting the best protec- tion against this threat is the only issue. An Anti-Virus safeguard alone is far too inadequate. There are too many threats starting from contaminated e-mails, exploits etc. What is required is comprehensive protection suite against all of these. Functional Diversity Because of the immense functional diversity of various Anti-Virus suites and corporate prod- ucts, it is becoming increasingly difficult for decision-makers in the IT sector to get a proper overview. Which product should one opt for and for which area of application? During these tests our main focus has not been on detection rates but, instead, on the prod- ucts with respect to their handling and user-friendliness and the scope of functionality. We have compiled the functional scope of various products in an extensively detailed table.
    [Show full text]
  • SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity
    SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPORT T Corporate Information N Board of Directors Tania Amochaev Donald E. Frischmann Rowan M. Trollope Former Chief Executive Officer Senior Vice President, Vice President, QRS Corporation Communications and Brand Management Security Management Solutions William T. Coleman III Dieter Giesbrecht Giuseppe Verrini Founder, Chairman and Senior Vice President, Vice President, Sales and Marketing, Chief Executive Officer Enterprise Administration Europe, Middle East, and Africa Cassatt Corporation Gail E. Hamilton Arthur W. Wong Franciscus Lion Executive Vice President, Vice President, Security Response Former Board Advisor and Global Services and Support Senior Executive Vice President N Investor Information ABN Amro Bank Thomas W. Kendra Senior Vice President, Worldwide Sales Annual Meeting David L. Mahoney The annual meeting of shareholders will be Former Co-Chief Executive Officer Rebecca A. Ranninger held on Wednesday, September 15, 2004 at McKesson HBOC Senior Vice President, Human Resources 8 a.m. at Symantec’s worldwide headquarters: 20330 Stevens Creek Blvd. Robert S. Miller Enrique T. Salem Senior Vice President, Gateway Solutions Cupertino, CA 95014 Former Chairman of the Board and (408) 517 8000 Chief Executive Officer Bethlehem Steel N Other Senior Executives Stock Exchange Listing Cosmo P. Battinelli Symantec’s common stock trades on George Reyes Vice President, Global Support the Nasdaq under the symbol SYMC. Chief Financial Officer Google Robert A. Clyde Transfer Agent Vice President, Chief Technology Officer EquiServe Trust Company, N.A. Daniel H. Schulman P.O. Box 219045 Chief Executive Officer Lily T. De Los Rios Kansas City, MO 64121 Virgin Mobile USA Vice President, Client Solutions www.equiserve.com (816) 843 4299 John W.
    [Show full text]
  • Symantec Protection Suite Enterprise Edition 4.0 Getting Started Guide
    Symantec™ Protection Suite Enterprise Edition 4.0 Getting Started Guide Dec. 2012 CONTENTS GETTING STARTED WITH SYMANTEC™ PROTECTION SUITE ....................................................... 4 ABOUT SYMANTEC PROTECTION SUITE ENTERPRISE EDITION ............................................................................ 4 ABOUT THE COMPONENTS INCLUDED IN SYMANTEC PROTECTION SUITE ENTERPRISE EDITION ............................. 5 SYMANTEC PROTECTION SUITE 4.0 ENTERPRISE EDITION REFERENCE ARCHITECTURE ......................................... 9 GETTING STARTED WITH SPS EE 4.0 ........................................................................................................... 11 WHERE TO GET MORE INFORMATION ........................................................................................................... 15 DOCUMENT LOCATIONS .......................................................................................................................... 15 ACCESSING THE SUITE SOFTWARE ................................................................................................ 17 Dec. 2012 SPS Enterprise Edition 4.0 Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2012 Symantec™ Corporation. All rights reserved. Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System, LiveUpdate, Norton, Norton 360, Sygate, and TruScan are trademarks or registered trademarks
    [Show full text]
  • SYMANTEC CORPORATION (Exact Name of the Registrant As Speciñed in Its Charter) Delaware 77-0181864 (State Or Other Jurisdiction of (I.R.S
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ¥ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Fiscal Year Ended April 1, 2005 OR n TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Transition Period from to . Commission File Number 0-17781 SYMANTEC CORPORATION (Exact name of the registrant as speciÑed in its charter) Delaware 77-0181864 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) IdentiÑcation No.) 20330 Stevens Creek Blvd., 95014-2132 Cupertino, California (zip code) (Address of principal executive oÇces) Registrant's telephone number, including area code: (408) 517-8000 Securities registered pursuant to Section 12(b) of the Act: None None (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: Common Stock, par value $0.01 per share, and Related Stock Purchase Rights (Title of class) Indicate by check mark whether the registrant (1) has Ñled all reports required to be Ñled by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to Ñle such reports), and (2) has been subject to such Ñling requirements for the past 90 days. Yes ¥ No n Indicate by check mark if disclosure of delinquent Ñlers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in deÑnitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.
    [Show full text]