Video Screencast Help

User Group Security & Compliance Deutschland

Public Group | Founded: 03 Nov 2009 | Serving 25 members

User Group Security & Compliance Deutschland

Sie haben Ihren Standort in Deutschland und setzen eines der Sicherheits- oder Compliance-Produkte von Symantec ein? Dann laden wir Sie herzlich zu unserer User Group ein! Um offizielles Mitglied zu werden, melden Sie sich bei "Connect" an und klicken Sie auf die Schaltfläche "Mitgliedschaft beantragen".

Hier ein paar gute Gründe unserer User Group beizutreten:

  • Best Practices kennenlernen, austauschen und einführen!
  • Erwerben Sie neue Kenntnisse und erweitern Sie Ihr Netzwerk!
  • Antworten und Lösungen zu Herausforderungen finden!
  • Erhalten Sie aktuelle Informationen zu Symantec-Produkten!
  • Connect-Punkte erwerben und für Prämien einlösen!

Group Activity

Show:
New blog entry 03 Jun 2014
Recently I commented a blog entry at "In Defense of Data" - a blog written by a variety of data security thought leaders and architects. The article is titled "Security and the Price of Coffee", and raised a very good point: ...
New blog entry 03 Jun 2014
In the past few weeks I was quite often involved into discussions about cloud security frameworks, proper attestation of security controls, and what criteria should apply for selecting cloud service provider. The lack of a widely agreed cloud risk or ...
New blog entry 03 Jun 2014
Late January 2012, the EU Commission presented the first proposal of a comprehensive reform of the existing EU Data Protection Directive. No doubt, the current Data Protection Directive requires more than just a slight refreshment, it requires a ...
New blog entry 03 Jun 2014
The role of the board of directors in Enterprise Risk Management (ERM) is changing significantly and becomes increasingly challenging due to major trends like cloud migration or big data, as well as initiative in mobile computing such as ...
New blog entry 03 Jun 2014
Today I found a small article in my daily RSS feeds titled "Miracle Battery-Saver App Harvests Email Addresses for Spamming". The article is a brief analysis of a malicious application that tricks the user by pretending to do something great ...
New blog entry 19 May 2014
Organisations are realizing a transformation from being "system-centric" to "information centric" – with a greater focus on the importance of data that will be increasingly distributed to a wide range of endpoints and devices. ...
New blog entry 19 May 2014
Effective IT strategy requires a comprehensive approach that aligns IT and the business by addressing multiple areas of discipline including IT risk management, operational efficiency, IT best practice and technology enablement. In particular, it ...
New download 28 Mar 2014
This little service provides configurable actions trigged by certain Symantec Endpoint Protection 12.1.x Events. Please Note: This is neither supported or endorsed by Symantec and is it to be used at the user's own risk.   Use Cases When a virus ...