@import url(/css/news/csp_sponsor_page.css); #story { width: 900px; } #cspSponsorPageShell{background: #FFFFEF;height: 100%;width: 100%;margin: 0 auto;} #sponsor{margin: 15px auto;width: 700px;} #lefturn{float: left;width: 194px;margin: 0 15px 0 25px;} #lefturn .box{border: 1px solid #ccc;background-color: #fff; padding: 5px;} .graybox{background-color: #efefef;margin: 15px 0 0;padding: 0;} .box a{margin: 4px 0;display: block;} .box p{margin: 0 0 15px;font-size: 11px;} .smallText { font-size: 10px; } .box h2 {margin: 0 0 15px;} img.podImg {border:1px solid #CCC; margin: 0 0 15px; } #sponsor { text-align: center; } #sponsor p { margin: 10px 0 10px 0; } #sponsorResources { width: 540px; } #sponsorResources p { margin: 20px 0; } #sponsorResources ul li a.follow { padding-bottom: 20px; } .ppLink { margin-bottom: 20px; } #sponsorResources p.ledeResource { border: 1px solid #ccc; padding: 10px; margin-top: 0; } #sponsorResources ul {list-style: disc; margin: -10px 0 0 30px; font-size: 95%; } #sponsorResources ul li { padding:0; margin: 0 0 5px; } content from our sponsor Enterprise Messaging Management Symantec Security Response Symantec Security Response provides customers with comprehensive, global, 24X7 Internet security expertise to guard against today's complex Internet threats and it the industry?s first global consortium to provide threat detection and protection for IM threats. Learn more » Enterprise Messaging Management Symantec?s Enterprise Messaging Management solutions help customers protect and manage their email and messaging traffic from the time it hits the network gateway until it is archived on tape. The benefits for IT administrators are lower capital and operational expenses, and greater assurance they?re protecting corporate information assets and meeting key regulatory requirements. Download trialware » Establishing the Business Case for IM Security This document provides an overview of the nature of IM threats, the potential return on investment for protecting the organization from these threats, and Symantec?s unique ability to implement the appropriate security protections. Learn more about the nature of the IM security threat and develop a business case» Multi Tier Email Security This white paper reviews the evolution of challenges facing email today and demonstrates ways in which email affects network security and business risk. Read more about implementing a multi-tier defense-in-depth approach to email security » Best Practices for IM Archiving and Compliance This document provides an overview of what Symantec believes to be best practices in managing IM as a record of business. Get guidance on the technical implementation of policy » See Symantec?s IM Manager Flash demo » (Flash required to view) View Symantec?s Enterprise Messaging Management demo » (Clicking will prompt download) A Single Solution for Messaging Management and Security Backed with survey results, this article builds the case for a more effective approach to deploying an integrated solution for email and messaging management and security. Learn about the great benefits for IT administrators » IM Detection Utility The Symantec IM Detection Utility offers a rapid installation of a packet inspection application to detect a large set of popular consumer IM networks and a subset of peer-to-peer networks that pose inherent security threats. This utility will give enterprises visibility into the amount of IM and P2P use that is occurring in the corporate network. The Symantec IM Detection utility detects a full set of IM protocols including, AOL, MSN, Yahoo! And Google Talk as well as P2P protocols such as Skype, eDonkey and Fasttrack. Get the utility » (Clicking will prompt download) Download Symantec?s Enterprise Messaging Management available trialware options »
Discuss: Symantec Resource Center
Be respectful, keep it civil and stay on topic. We delete comments that violate our policy, which we encourage you to read. Discussion threads can be closed at any time at our discretion.