Symantec News

View All News

Symantec Get Started

Bring yourself up to speed with our introductory content

  • partner program

    A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services. Continue Reading

  • unified threat management (UTM)

    Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console. Continue Reading

  • Dual-persona technology: What it is and how it works

    Dual-persona technology is still new, so IT pros want to know how it works and what the drawbacks are. Check out this FAQ for those answers and more. Continue Reading

View All Get Started

Evaluate Symantec Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Symantec

Learn to apply best practices and optimize your operations.

  • Developing a continuous security monitoring program for 24/7 security

    Developing a continuous security monitoring program to ensure 24/7 security is no easy task. Michael Cobb offers key advice for completing the task. Continue Reading

  • Cyberthreats: Know thy enemy

    The complexity of emerging technologies and trends such as BYOD has security teams operating at full speed, and there's no sign of slowing down. In our inaugural issue of 2014, we look at the top cyberthreats that security professionals are likely to face this year. Defending enterprise networks has never been harder, according to Johannes Ullrich, head of the SANS Technology Institute's Internet Storm Center, who examines upcoming attack techniques and discovers new versions of tried-and-true hacking methods.

    Advanced malware detection is also evolving, and we report on new strategies as security teams fight back with help from global services. We also address security issues after the gadget-filled holidays in a new column on mobile security. Finally, take a tour of the deep Web, and find out how security professionals can intercept Tor and Bitcoin activities on corporate assets. Continue Reading

  • A new path to remote IT support that makes the branch offices happier

    With multiple data center locations, enterprises must design new platforms to provide access to remote employees instead of centralizing technology. Continue Reading

View All Manage

Problem Solve Symantec Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve