skip to Main Content

Symantec - Further Information

This page shows up to 100 pieces of content (newest at the top):

REMOTE WORKING SOCIAL TEAMS Spotlight cover thumbnail

Remote working, with Social Teams and personalities - A key to being Mutable in practice

This remote working paper is aimed at managers and team members of the effective, resilient, teams needed to manage business continuity in the “new normal”.
Cover for How to raise your organisation's security maturity level

How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern

This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
Cover for Practices for Enhancing Data Security

Practices for Enhancing Data Security - a survey of organisations in the UK and the US

This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
Cover for Document Content Security V2

Document Content Security V2

Preventing malicious documents from traversing networks will help considerably in preventing security breaches.
Cover for Security intelligence: solving the puzzle for actionable insight

Security intelligence: solving the puzzle for actionable insight

The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent
Cover for Document Content Security

Document Content Security

Documents are key weapons used in advanced targeted attacks, which are fast growing in popularity among criminals.
Cover for Advanced Threat Protection

Advanced Threat Protection

Advanced targeted threats are today's reality for organisations and traditional technology controls are not up to the task of defending networks.
Cover for The need to protect against file-based attacks

The need to protect against file-based attacks - statistical evidence for the need for greater assurance

The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
Cover for Identity & Access Management Services

Identity & Access Management Services

This document provides a snapshot of the current state of the market for identity and access management services.
Back To Top