Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
new discussion 17 Sep 2014
I'm trying to use VIP 2.1.1 2.1.1.34, on Windows 7 64bits Each time I try to open it, the following error appears in a pop-up window:   [Window Title] C:\Program Files (x86)\Symantec\VIP Access Client\VIPUIManager.exe [Content] C:\Program Files (x86)\Symantec\VIP Access Client\VIPUIManager.exe The application has failed to start because its side-by-side configuration is incorrect. ...
updated article 15 Sep 2014
You can now enable strong authentication for users with Symantec Validation and ID Protection Service (VIP)  credentials by integrating your enterprise applications using the Symantec VIP APIs.  These APIs are part of VIP Product suite and can be tried by creating a free Trial Account here (symantec.com).   
updated download 15 Sep 2014
The Symantec PGP Software Development Kit (SDK), written in C, provides developers the functionality to add PGP cryptographic technology to their own C or C++  software applications.  The SDK lets you easily develop, maintain, and use PGP cryptographic components in your application, providing yourself and your customers with the confidence that comes from using the trusted and ...
updated blog entry 15 Sep 2014
  Performance of the network can play a major differentiator in the cloud. Given the problem of having hundreds of tenants sitting on your cloud with several thousand virtual machines sending terabytes of data, it becomes essential to build a robust network as well as thoroughly test it. Fortunately, with OpenStack Neutron’s plugin based architecture, the IaaS provider has several ...
new discussion 05 Sep 2014
Hello,  I am a software developer in Germany. I want to ask  1 if I can use the pgpsdk (https://www-secure.symantec.com/connect/downloads/...) in our software development. 2 if I can, what is the price of this product?    Haibo Wu
new discussion 05 Sep 2014
Hi I wanna do automation decryption at my server due security reason i cannot hardcode the passphrase. How can save the passphrase? Or can i decryption pass.txt without passphrase?
new discussion 04 Sep 2014
We have SPE7.5 running on Linux. I am using java SDK to scan source file in streamscan mode. 1.5GB file takes about 40 seconds to scan when i run 4 of these scan parallely from my remote java call to the SPE server, i Dont get anything back even after hours of waiting. Do we need to do anything specific to make SPE 7.5 work in multi-threaded mode? Is there any timeout setting that i need to ...
new idea 01 Sep 2014
I would like to suggest to set a password through SEPM to prevent end users from turning off SEP. 
new discussion 17 Sep 2014
I'm trying to use VIP 2.1.1 2.1.1.34, on Windows 7 64bits Each time I try to open it, the following error appears in a pop-up window:   [Window Title] C:\Program Files (x86)\Symantec\VIP Access Client\VIPUIManager.exe [Content] C:\Program Files (x86)\Symantec\VIP Access Client\VIPUIManager.exe The application has failed to start because its side-by-side configuration is incorrect. ...
new discussion 05 Sep 2014
Hello,  I am a software developer in Germany. I want to ask  1 if I can use the pgpsdk (https://www-secure.symantec.com/connect/downloads/...) in our software development. 2 if I can, what is the price of this product?    Haibo Wu
new discussion 05 Sep 2014
Hi I wanna do automation decryption at my server due security reason i cannot hardcode the passphrase. How can save the passphrase? Or can i decryption pass.txt without passphrase?
new discussion 04 Sep 2014
We have SPE7.5 running on Linux. I am using java SDK to scan source file in streamscan mode. 1.5GB file takes about 40 seconds to scan when i run 4 of these scan parallely from my remote java call to the SPE server, i Dont get anything back even after hours of waiting. Do we need to do anything specific to make SPE 7.5 work in multi-threaded mode? Is there any timeout setting that i need to ...
updated discussion 26 Aug 2014
Hi Experts, I am new to the PGP command line tool & we are using PGP command line tool for encrypting the files and we are facing some issue. We got public keys from our partners. now we have to encrypt text file using these public keys. what steps I need to follow to encrypt the file? I am using --encrypt "{0}" --recipient "{1}" --output "{2}" command to ...
updated discussion 26 Aug 2014
I am using stream scan java api to get a file scanned. this is what i use from the API doc, there is no explanation on what the actualFileName is. OriginalFileName is the the name of the file i want scanned actualFileName - i have no idea what this needs to be. If it means what the file will land as on the SPE server? what do i care? Even if i do care, what name should i give this file? same ...
new discussion 21 Aug 2014
I am using stream scan java api to get a file scanned. this is what i use from the API doc, there is no explanation on what the actualFileName is. OriginalFileName is the the name of the file i want scanned actualFileName - i have no idea what this needs to be. If it means what the file will land as on the SPE server? what do i care? Even if i do care, what name should i give this file? same ...
new discussion 20 Aug 2014
My touchdown on my LG G3 phone is working great, but I can't see the settings to turn off the notifications off - HELP if anyone knows 
updated article 15 Sep 2014
You can now enable strong authentication for users with Symantec Validation and ID Protection Service (VIP)  credentials by integrating your enterprise applications using the Symantec VIP APIs.  These APIs are part of VIP Product suite and can be tried by creating a free Trial Account here (symantec.com).   
updated article 02 Aug 2013
updated article 02 Aug 2013
updated article 02 Aug 2013
updated article 02 Aug 2013
updated article 02 Aug 2013
updated article 02 Aug 2013
updated article 02 Aug 2013
updated article 02 Aug 2013
updated blog entry 15 Sep 2014
  Performance of the network can play a major differentiator in the cloud. Given the problem of having hundreds of tenants sitting on your cloud with several thousand virtual machines sending terabytes of data, it becomes essential to build a robust network as well as thoroughly test it. Fortunately, with OpenStack Neutron’s plugin based architecture, the IaaS provider has several ...
updated blog entry 01 Aug 2014
Contribution Process Overview     Step 1: Registration This step describes end-to-end registration process so that you can start contributing to Openstack. Here are just a few ways of how you can become part of community: Report a bug / Apply a bug fix Blueprint Engagement Code Reviews Registration Checklist: Here is the registration checklist: GitHub Launchpad SSH Key Join ...
updated blog entry 11 Jul 2014
What is it ?:  Kubernetes is a newly released Google’s Container-as-a-Service solution. Its an orchestration middleware built on top of another popular technology Docker which is known for creating and managing lightweight linux containers from where application can be built and run out of.    Building blocks of Kubernetes: While Docker itself works with individual containers, ...
updated blog entry 07 Jul 2014
This blog describes end-to-end process for switching from Keystone V2.0 to V3. Running a small experiment on single node OpenStack Havana instance on Ubuntu 12.04.4 LTS Precise Pangolin. I have used DevStack for deploying and configuring OpenStack which by default comes with Keystone V2.0. We had a requirement to test Domains functionality which was introduced in Keystone V3. Making sure that ...
updated blog entry 24 Jun 2014
You’re talking to one of your users about hosting a new application on your OpenStack deployment.  One of the first questions they ask you is:  “I’m running my SQL database on 64 cores and 256GB of memory… can you host that for me on OpenStack?”   Databases on OpenStack As I described in my last post, we’re building a huge private cloud at Symantec.  Early on, before we had ...
updated blog entry 21 Jun 2014
I know what you’re thinking…  why am I talking to you about Symantec... cloud...  and OpenStack? When people think of Symantec, their minds often go straight to antivirus.  In fact we do a lot more than that, we secure and manage information.  Drill in a bit, and you’ll find that this encompasses lot of things: big data analytics, massive data storage, real-time traffic ...
updated blog entry 12 Mar 2013
Mobile phones, like any electronic apparatus having two parts: the hardware (keyboard, screen, speaker ...) and software (display, read messages, calendar, games ...). There is specialized software, the operating system that controls other applications, but mainly manages the hardware devices. In computers we can clearly distinguish the operating system (Windows, Linux, and Mac OS) from other ...
updated download 15 Sep 2014
The Symantec PGP Software Development Kit (SDK), written in C, provides developers the functionality to add PGP cryptographic technology to their own C or C++  software applications.  The SDK lets you easily develop, maintain, and use PGP cryptographic components in your application, providing yourself and your customers with the confidence that comes from using the trusted and ...
updated download 12 Aug 2014
The presentation describes the changes to how ApplicationHA works in VMware and Hyper-V environment with the release of SFHA 6.1 for Windows. Supported with two demonstrations: 1. Installing ApplicationHA 6.1 for Microsoft Hyper-V 2. Application configuration of IIS 8.0 using a Web UI of AppHA 6.1
updated download 04 Jun 2014
SEP 12.1.5 JavaMail 1.5.1 JDIC 0.95-2 (a modified version of JDIC)
updated download 02 Jun 2014
updated download 02 Jun 2014
updated download 14 Apr 2014
The following are open source packages licensed under the GPL or LGPL that are used in Symantec Enterprise Vault.  They are published here in order to comply with the requirements of these licenses. 5.2      
updated download 27 Aug 2013
The following are open source packages licensed under the GPL or LGPL that are used in Symantec Protection Engine.  The are published here in order to comply with the requirements of these licenses. 7.5 libiconv 1.14 libstdc++ 4.4.4 libgcc 4.4.4  
updated download 20 Aug 2013
Home page    
updated download 13 Aug 2013
The following are open source packages licensed under the GPL or LGPL that are used in Symantecs NetBackup.  The are published here in order to comply with the requirements of these licenses. NetBackup 7.5 iText 2.1.3 backport-util-concurrent (this is a customized version created by the JacORB project for JacORB 2.2.3) NetBackup 7.5.0.7 pthreads-win32 2.9.1  
updated download 04 Jun 2013
new idea 01 Sep 2014
I would like to suggest to set a password through SEPM to prevent end users from turning off SEP. 
new idea 23 Jul 2014
I'd like to see the option to have the send email, and other components that do things that you may not want to actually happen in a testing environment have the option to use a process variable for "enabled"   right now i just see a checkbox, but if i could use a process variable i could "toggle" it on or off and then all the components i might not want to function, would be disabled. ...
new idea 24 Jun 2014
To collect the S/W Inventory on condition based; 1. To gather the inventory for the computers which are connected in the environment the software inventory to be sent automatically instead of schedule. 2. If 1000 computers are set to gather the full software inventory policy for custom schedule at 11,13,15,17. if 500 sends the inventory and if remaining is 500 will be automatically be ...
new idea 09 May 2014
Regarding the application and device control log: I would really like to have the username and computer name added to the report generated by the client. If the scheduled report that i receive (application and device control report) could also include the computer name and username, that would be even better.  
new idea 02 May 2014
There is not a straightforward, easy way to restore Symantec System Restore backups made on a system where the hard disk has been encrypted using the whole disk encryption feature of Symantec Encryption Desktop. I have spent hours researching the workarounds offered in tech articles. I recommend improving these programs so that they work together easily and giving instructions in each user's ...
new idea 22 Apr 2014
Currently our product is designed to give the creator of a job/task the rights to clone this job/task even if this right was explicitly removed (Per TECH198822)   My customer has removed the rights to clone Jobs/Tasks for a specific role. The user who is a member of this role is however still able to clone any jobs that they have created because they are the owner of the ...
new idea 10 Apr 2014
in VCS 6.1 security mode ,  allows anyone else to login to the cluster as a guest which was a unexpected side effect. we don't want allow any user to login if we don't provide access.