SUPPORT


Free email, chat, or phone support* check check
AutoFix technology will diagnose and fix common problems for you

PC TUNEUP


Finds and fixes problems that slow your computer check check
Cleans and repairs Windows registry check check
Removes Internet clutter such as cookies and temporary files

BACKUP AND RESTORE


Automatically backups on schedule check check
Backs up to a local hard drive or external device check check
Includes 2GB of secured online storage check
Includes 25GB of secured online storage check
Restores files easily

NETWORKING


Helps secure and monitor your home network check check
Automatically secures your PC when connecting to public wireless hotspots

IDENTITY PROTECTION


Blocks phishing Web sites check check
Identity Safe securely stores and manages your login and personal information check check
Guards against keyloggers with automatic login and form filling check check
Authenticates popular shopping and banking sites check check
NETWORKING

ADVANCED PROTECTION


Blocks browser, OS, and application threats; protects against infected Web sites check check
Protects against the latest threats with proactive multilayered protection system check check
Real-time SONAR technology detects emerging spyware and viruses before traditional definitions are available

CORE PROTECTION


Protects against viruses, spyware, Trojan horses, worms, bots, and rootkits check check
Stops threats at point of entry with a quiet two-way firewall check check
Pulse updates every 5 to 15 minutes or faster check check
Intelligence-driven technology for faster, fewer, shorter scans

Business Store Products


Backup Exec
Backup Exec 12.5 for Windows Servers License + Essential 12 Months Support
Backup Exec 12.5 for Windows Small Business Servers Premium Edition License + Essential 12 Months Support
Backup Exec 12.5 for Windows Small Business Servers Standard Edition License + Essential 12 Months Support

Backup Exec Agents/Options
Backup Exec 12.5 Agent for Windows Active Directory License + Essential 12 Months Support
Backup Exec 12.5 Agent for Microsoft Exchange Server License + Essential 12 Months Support
Backup Exec 12.5 Agent for Microsoft SQL Server License + Essential 12 Months Support
Backup Exec 12.5 Agent for Microsoft Virtual Server License + Essential 12 Months Support
Backup Exec 12.5 Agent for VMware Virtual Infrastructure License + Essential 12 Months Support
Backup Exec 12.5 Agent for Windows Systems License + Essential 12 Months Support
Backup Exec 12.5 Library Expansion Option License + Essential 12 Months Support

Backup Exec Training
Backup Exec Tech Center On-Demand 1 Year Membership English Training

Backup Exec System Recovery
Backup Exec System Recovery 8.5 Desktop Edition + Essential 12 Months Support
Backup Exec System Recovery 8.5 Server Edition + Essential 12 Months Support
Backup Exec System Recovery 8.5 Server Edition Starter Kit + Essential 12 Months Support
Backup Exec System Recovery 8.5 Windows Small Business Server Edition + Essential 12 Months Support

Backup Exec System Recovery Agents/Options
Backup Exec System Recovery 8.5 Granular Restore Option + Basic 12 Months Support
Backup Exec System Recovery 8.5 Manager + Basic 12 Months Support

Brightmail
Brightmail Gateway 8.0 License + Essential 12 Months Support
Brightmail Message Filter 6.1 AntiSpam & AntiVirus + Basic 12 Months Support
Brightmail Message Filter 6.1 AntiSpam & AntiVirus + Essential 12 Months Support
Brightmail Message Filter 6.1 AntiSpam + Basic 12 Months Support
Brightmail Message Filter 6.1 AntiSpam + Essential 12 Months Support

Key Benefits


* Increase storage utilization across heterogeneous operating systems and storage arrays.
* Increase operational efficiency with comprehensive visibility and centralized management of applications, servers and storage across multiple hosts.
* Enhance storage I/O path availability and performance and efficiently spread I/O across multiple paths.
* Free data from technology changes - dynamically migrate data to different tiers of storage and perform seamless data migrations across different server architectures.
* Simplify both the management and provisioning of storage, while increasing storage utilization, lowering costs and improving operational efficiencies.

Key Features


* Online storage management with heterogeneous operating system (Solaris, Linux, HP-UX and AIX) support and broad set of qualified storage devices and arrays.
* Storage Foundation Manager allows centralized management of diverse applications, servers and storage.
* Dynamic multi-pathing enables I/O to be efficiently spread across multiple paths for path failure protection and fast failover.
* Dynamic storage tiering enables data to be dynamically moved to different storage tiers to rapidly respond to changing business needs.
* Thin provisioning enables storage capacity to be over allocated to applications and physical capacity to be consumed only as applications actually write data.

Veritas Storage Foundation


Veritas Storage Foundation 5.0 from Symantec provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager and Veritas File System, it provides a standard set of integrated tools to centrally manage explosive data growth, maximize storage hardware investments, provide data protection and adapt to changing business requirements.

IT Projects: Business Continuity Planning



Definition
Inter-related business and IT disciplines, spanning people, processes, and technology, designed to help companies prevent and recover from business disruptions.
Challenges

* Interruptions to business-critical processes, leading to lost revenue.
* Outages impacting employee productivity and customer relationships, with possible legal consequences.
* Undefined or inconsistent processes that hamper the ability to rapidly recover data and systems after an outage.
* Meeting recovery point and recovery time objectives as defined by the business continuity plan.

Windows Protection for the Banking Industry


For today’s regional or community banks and credit unions Symantec offers Windows-based protection solutions that are easy to acquire, deploy, and manage - bringing enterprise-class performance without the cost and complexity associated with enterprise solutions.

* Key Products & Services

Featured Resources

* Brochure: Financial Services Information Security and IT Risk Management
* The 12 Business Benefits of Workspace Virtualization
* Webcast: How to Secure Your Customers' Confidence in Online Banking
* Webcast: Business Resiliency - Best Practices To Assess and Manage Operational Risk
* Webcast: Online Fraud Prevention: Protecting Your Institutions and Your Customers
* Article: Don't Be Hoodwinked: Proactive Protection Isn't 'Easy'

Bookmark & Share
Technorati
Digg
Delicious
Reddit
StumbleUpon
Facebook
Yahoo
Twitter
Faves
Newsvine
Call: 1-800-721-3934
Solution Focus

* Overview
* IP-ATM Security
* Operational Risk Management
* Windows Protection for the Banking Industry

Related Resources

* Key Products & Services
* White Papers
* Webcasts
* Podcasts
* Multimedia Tours
* Feature Articles
* Customer Success

How to Purchase

* Contact Enterprise Sales

Online Fraud Protection

Operational Risk Management


Symantec's state-of-the-art operational risk management solutions help institutions manage systems availability and business resiliency across the enterprise. Our security, high availability, monitoring, recovery, and reporting products and services help keep business processes running, all while improving their performance.

Financial Services


Symantec security and availability solutions enable financial institutions to manage and mitigate risk more effectively. Our solutions can help you protect customer data and transactions, comply with regulations, improve performance, and avoid costly service disruptions.

FileConnect


FileConnect is Symantec’s electronic software distribution website, allowing Symantec’s customers to download enterprise products or order a media kit.

* Download enterprise products
* Order media kits

Learn more | Access FileConne

Licensing Portal


The Licensing Portal is an online tool for product activation, registration of licenses for software subscriptions, maintenance/support (including software version upgrades), delivery of license keys, management of existing license data, and processing of software version upgrade notifications.

* Get license keys, version upgrades and re-hosts
* Manage, share and track licenses
* Use the Voucher Center

Learn more | Access the Licensing Portal

Messaging Security




Many Symantec enterprise products require activation through the installation of a license file, license key, or activation code.

Security



Security Management
Link security policies to processes to identify threats, prevent loss of critical data, and make the most of valuable administrative resources.

* Control Compliance Suite
* Security Information Manager

Endpoint Security
Improve threat monitoring and reduce the administrative burden of protecting critical network endpoints such as desktops, servers, laptops, and mobile devices against known and unknown threats.

Fighting the flood of spam


From 2001 to 2008, spam increased from 8% to over 80% of all email. Spam wastes IT resources, harms employee productivity, and can hide dangerous phishing attacks and other malicious threats. Learn more

Secure Information Secure Information Manage Systems Recover Data, Systems, and Email Secure Information Secure Information Manage Systems Recove

Reduce Risks and Protect Critical Information with Ease
Cyber threats are getting stealthier. Protect yourself with essential endpoint security, messaging security, and data and system protection for your Windows environment.

* Reduce or eliminate spam and other security threats before they enter your network.

* Improve threat monitoring and reduce administrative burden of protecting endpoints against known and unknown threats.

* Protect information on clients and servers, and in networks and email with efficient backup and recovery.

The Basics: Getting Started

Transact Safely


Welcome to Symantec’s Online Transaction Security Center. Here you will find information on how to combat online identity theft and fraud with Norton 360 or Norton Internet Security, which offer protection from malicious software and phishing.

Use our valuable resources to maximize your network security options and learn how to protect your data while logging in, making purchases, or otherwise conducting your business online. When this is done, you'll have the confidence to work, play, and share over a secure online connection.

What is Cybercrime?


Over the last 18 months, an ominous change has swept across the Internet. The tools driving the new attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.

Cybercrime Stories

Are you like Sandra E?

* Never had a virus
* Shop in store, not online
* Use popular search engines

Read how you could become a cybercrime victim
2 year protection

How They Attack


Threats today have become more complicated. They tend to use multiple vectors to spread, thus increasing their chances of infection. Once on the system, these threats tend to show little to no symptoms so they can survive undetected.

Microsoft released ten Security Bulletins


Microsoft released ten Security Bulletins that fix vulnerabilities in Microsoft Office that could allow an attacker to take over a computer. The attacker can exploit these issues by distributing maliciously crafted files via file-sharing applications. >Microsoft Security Bulletin for June 2009

Microsoft released ten Security Bulletins


Microsoft released ten Security Bulletins that fix vulnerabilities in Microsoft Office that could allow an attacker to take over a computer. The attacker can exploit these issues by hosting maliciously crafted Word or Excel files on websites. >Microsoft Security Bulletin for June 2009

Microsoft released ten Security Bulletins


Microsoft released ten Security Bulletins that fix vulnerabilities in Microsoft Office that could allow an attacker to take over a computer. The attacker can exploit these issues by hosting maliciously crafted Word or Excel files on websites. >Microsoft Security Bulletin for June 2009

Viruses & RisksSymantec Internet Threat Meter


Microsoft released ten Security Bulletins
Microsoft released ten Security Bulletins that fix vulnerabilities in Microsoft Office that could allow an attacker to take over a computer. The attacker can exploit these issues by sending maliciously crafted Word or Excel files as email attachments. >Microsoft Security Bulletin for June 2009

Driving Efficiencies


Global provider of hosted clinical development solutions that enhance the efficiency of clinical development processes and optimize research and development investments by streamlining the design, planning and management of key aspects of the clinical development process, including protocol development, investigator benchmarking and budgeting, contract research organization benchmarking and budgeting and the capture, management, analysis and reporting of clinical trial data.

MOST POPULAR


Nortel Introduces Lifetime Warranty for ERS Portfolio
• Apple India Chief Quits
• APC, Rashi to Increase Penetration for UPS
• Gigabyte Rolls Out New Motherboard Technologies
• Linksys by Cisco Rolls Out Dual-Band Wireless-N Router

MOST DISCUSSED
• RCTA to Organize Rajasthan Computer Expo 2009 (7)
• Apple India Chief Quits (7)
• Kaspersky to Launch 1-user Retail Packs (5)
• Nivio Launches Rs 4,999 Computer (4)
• Zenith’s retail expansion plans

Top 10 Security Risks MIEL Security


Organizations are besieged today with the growing list of security risks. The sheer volume of risks in the business environment ensures that discovering them becomes an overwhelming task.
2008 was, without a doubt, a year in which the problems of information protection came sharply into focus. Be it government agencies in the UK losing private citizen information or Indian BPO’s battling malicious employees. Expressions such as “identity theft”, “computer fraud” and “planted insiders”, which were once, limited to information security specialists, have become more and more familiar.

Supercomputer as a Service


One and half year after making a stunning entry into the global supercomputer list with Eka—ranked as the fourth-fastest supercomputer in the world—Computational Research Laboratories (CRL), a Tata Sons’ subsidiary, has succeeded in creating a new market for supercomputers by offering its supercomputing power on rent. For now, for want of a better phrase, let us call it ‘Supercomputer as a service.’
With more than 40 organizations in India hiring its services, CRL has made a mark in a field where only a few organizations have dared to venture. In a period of recession, Eka has opened up new possibilities for industries that require the massive crunching power of supercomputers—but only during certain phases of their product development lifecycle.
For example, Tata Elxsi used Eka’s processing power to reduce the time required for rendering the animation movie, Roadside Romeo. The activity, which would have taken the firm approximately 36-40 months to digitally render the movie in a studio, took only six months due to the computing power of Eka. It is significant to note that the firm achieved this feat using only one-third of the processing power of Eka.
Similarly, leading aerospace company Boeing is using Eka’s capability to bring its ideas to the market faster by offering design and simulation support. And Tata Motors is using Eka for vehicle simulation and testing digital prototypes.
CRL is also looking at potential opportunities in sectors such as life sciences, weather forecasting, animation and automotives.