Endpoint Protection

 View Only
  • 1.  How to improve our software standing with Symatec?

    Posted Dec 04, 2011 06:00 AM

    I work at a small translation company, and we have developed a freeware called ChangeTracker. Recently we got emails from couple of our users that they can't download the software, because NIS prevents them from doing that basing on "reputation".

    Could you tell me, whom shall I contact to improve standing of our software with NIS? I really want to help users get rid of frustration, when another freeware they want to use is recognized as suspicious.



  • 2.  RE: How to improve our software standing with Symatec?
    Best Answer

    Posted Dec 04, 2011 08:08 AM

     

    Software White-Listing Request

    https://submit.symantec.com/whitelist/isv/



  • 3.  RE: How to improve our software standing with Symatec?

    Posted Dec 05, 2011 04:32 AM

    “Sizing and Scalability Recommendations for Symantec Endpoint Protection” (rev 2.3) contains a section on "Preventing and Correcting False-Positive Detections with Symantec Endpoint Protection 12.x " - highly recommended!  &: )

    http://clientui-kb.symantec.com/resources/sites/BUSINESS/content/staging/DOCUMENTATION/4000/DOC4448/en_US/1.0/Endpoint%20Protection%20Sizing%20and%20Scalability%20Best%20Practices_%20v2.3.pdf
     



  • 4.  RE: How to improve our software standing with Symatec?

    Posted Dec 05, 2011 10:37 AM

    You imply that your product is NIS (Norton Internet Security); is that true?

    If so, you have posted to the corporate SEP support forum.

    MJD



  • 5.  RE: How to improve our software standing with Symatec?

    Posted Dec 05, 2011 11:17 AM

    Just a clarifying note to the forum community: both NIS and the new SEP 12. 1use the same reputation-based technologies to further protect customers. 

    For detailed info on Reputation/SONAR, see Symantec Security Response’s October 2010 whitepaper “Reputation-based Security: An Analysis of Real World Effectiveness” at http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/reputation_based_security.pdf