Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Symantec IT Risk and Compliance Product Group

Public Group | Founded: 07 Jan 2011 | Serving 610 members

Are you a current user of Symantec’s IT risk and compliance technologies? Do you have a version of Symantec Control Compliance Suite (CCS), Symantec Enterprise Security Manager (ESM), or BindView Control installed? If so, this product community is for you.

We encourage you to participate in our user forum, check out our online webinars and user group events and view our library of technical resources.

Start engaging today. By sharing your knowledge and experiences, you can save someone else the pain of figuring out challenges on their own. Plus, in recognition of your efforts, Symantec is pleased to offer you Connect Points which you can redeem for all kinds of great prizes.

Symantec Control Compliance Suite Vulnerability Manager Report Templates

(Group Membership Required)

Group Activity

Show:
New blog entry 03 Jun 2014
Recently I commented a blog entry at "In Defense of Data" - a blog written by a variety of data security thought leaders and architects. The article is titled "Security and the Price of Coffee", and raised a very good point: ...
New blog entry 03 Jun 2014
In the past few weeks I was quite often involved into discussions about cloud security frameworks, proper attestation of security controls, and what criteria should apply for selecting cloud service provider. The lack of a widely agreed cloud risk or ...
New blog entry 03 Jun 2014
Late January 2012, the EU Commission presented the first proposal of a comprehensive reform of the existing EU Data Protection Directive. No doubt, the current Data Protection Directive requires more than just a slight refreshment, it requires a ...
New blog entry 03 Jun 2014
The role of the board of directors in Enterprise Risk Management (ERM) is changing significantly and becomes increasingly challenging due to major trends like cloud migration or big data, as well as initiative in mobile computing such as ...
New blog entry 03 Jun 2014
Today I found a small article in my daily RSS feeds titled "Miracle Battery-Saver App Harvests Email Addresses for Spamming". The article is a brief analysis of a malicious application that tricks the user by pretending to do something great ...
New blog entry 19 May 2014
Organisations are realizing a transformation from being "system-centric" to "information centric" – with a greater focus on the importance of data that will be increasingly distributed to a wide range of endpoints and devices. ...
New blog entry 19 May 2014
Effective IT strategy requires a comprehensive approach that aligns IT and the business by addressing multiple areas of discipline including IT risk management, operational efficiency, IT best practice and technology enablement. In particular, it ...
New blog entry 28 Apr 2014
What is Heartbleed? By now, you should be very well aware of vulnerability CVE-2014-0160, nicknamed HeartBleed.  Security engineers at Codenomicon and Google discovered a vulnerability last week in the popular OpenSSL cryptographic software ...
New event 24 Mar 2014
Attention all members of the Philadelphia Security & Compliance User Group! Please join us for the next Philadelphia Security & Compliance User Group meeting on Wednesday March 26th from 9:00am to 12:00pm at Dave & Buster's. The meeting ...