Video Screencast Help
new discussion 22 May 2015
I downloaded the TouchDown application recently, but I can not find in settings where to setup the notification on my company iphone 5c.  I purchase this app to configure and test so I can purchase this app for the entire department to use to setup notification on our email to ring/alert for SCOM emails. When I had the EVO and downloaded TouchDown by NitroDesk, Inc I was able to ...
new blog entry 21 May 2015
Our Global Service Provider team will be a platinum sponsor at this year's Big Telecom Event (sponsored by Light Reading) in Chicago, June 9-10, 2015 where we'll be focusing on our Information Protection story at our Booth #520.  In addition, Symantec will be participating on two panel session: Tuesday, June 9 – 3:00-4:00 pm - Dealing with DDOS and Advanced ...
updated blog entry 21 May 2015
We know what to do when the fire alarm sounds, but what if the sparks are on our desktop? Developing an active Phishing Campaign for the enterprise is akin to a fire drill practice and should become second nature. Cyber-crime organisations, nation states and hactivism all use similar toolsets to get what they want. The scatter gun approach is no longer as pervasive as it once was. Intellectual ...
updated blog entry 20 May 2015
A few weeks ago at the RSA Conference 2015, the OpenID Foundation announced the launch of its OpenID Connect Certification, an important program that enables organizations to certify that their OpenID Connect implementations conform to specified profiles of the OpenID Connect standard. We are pleased to announce that Symantec is hosting this self-certification process and providing the ...
updated blog entry 19 May 2015
An average car produces about 1.1 pounds of CO2 emissions per mile – a bike releases none. Biking five days a week for a full year could save between .7 – 1.9 Tons of CO2. Not only is biking a green way to travel, it is also great for your health. A San Francisco Bay Area study found that increasing biking and walking from 4 to 24 minutes a day on average would reduce cardiovascular disease ...
updated article 19 May 2015
Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Symantec centralized certification management program globally.  Our global staff of certification professionals actively promotes awareness ...
updated article 19 May 2015
The Federal Service for Technical and Export Control (FSTEK) certification is required in order to sell information security systems in Russia. The regulations covering these requirements were  introduced by the Russian government  in July 2011. The Russian government  introduced  these requirements to ensure that establishments handling personal/confidential/government ...
new discussion 22 May 2015
I downloaded the TouchDown application recently, but I can not find in settings where to setup the notification on my company iphone 5c.  I purchase this app to configure and test so I can purchase this app for the entire department to use to setup notification on our email to ring/alert for SCOM emails. When I had the EVO and downloaded TouchDown by NitroDesk, Inc I was able to ...
updated discussion 09 May 2015
Hi All, Currently we are using Microsoft TMG 2010 as proxy server in our organization. TMG is handling around 2000 users with load balancing feature on two nodes.Count of users is gradually increasing. Now planning to replace TMG with Symantec Web Gateway Virtual Applicance. Will it handle this many users..? and is there any provision to configure load balancing in Symantec Web Gateway Virtual ...
updated discussion 09 May 2015
I can’t create case mysymantec portal.  In IE “This content cannot be displayed in a frame” error receiving. Other browser create case form not open. Just  white page
updated discussion 05 May 2015
Hi! I can't open my Manage Case page on My Symantec Portal. I already updated my browser. Thanks!
discussion comment 22 Apr 2015
updated article 19 May 2015
Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Symantec centralized certification management program globally.  Our global staff of certification professionals actively promotes awareness ...
updated article 19 May 2015
The Federal Service for Technical and Export Control (FSTEK) certification is required in order to sell information security systems in Russia. The regulations covering these requirements were  introduced by the Russian government  in July 2011. The Russian government  introduced  these requirements to ensure that establishments handling personal/confidential/government ...
updated article 18 May 2015
Common Criteria The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach to the evaluations of information technology products and protection profiles for information assurance and security. This arrangement benefits member nation governments and other customers of IT products by creating more clarity in procurement ...
updated article 06 May 2015
VPAT™ Voluntary Product Accessibility Templates The purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial “Electronic and Information Technology” products and services with features that support accessibility. Symantec supports the U.S. ...
updated article 05 May 2015
Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Federal Government.   If you don't have a certificate or at least demonstrate a commitment to obtaining one, then there is a good ...
updated article 05 May 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
updated article 29 Apr 2015
UK Cyber Essentials Background:  From 1 October 2014, the UK government has made it mandatory that all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme. The scheme’s five security controls apply to: Access Control Malware Protection Patch Management Secure Configuration Boundary Firewall and Internet ...
updated article 29 Apr 2015
Federal Risk and Authorization Management Program (FedRAMP) Symantec Product Status Symantec Validation and Identity Protection (VIP) In Progress The Federal Risk and Authorization Management Program, or FedRAMP, is a government-wide program (www.fedramp.gov) that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products ...
updated article 29 Apr 2015
Federal Identity, Credential and Access Management (FICAM) Trust Framework Solutions (TFS) The FICAM TFS (http://idmanagement.gov/trust-framework-solutions) is the federated identity framework for the U.S. Federal Government. It includes guidance, processes, and supporting infrastructure to enable secure and streamlined citizen and business facing online service delivery. The following ...
updated article 23 Mar 2015
This page contains our most frequently requested public facing documentation.  Users that have accepted our Non-Disclosure Agreement (NDA) may access confidential data such as ISO/IEC 27001 certifications, SOC reports and evidence of insurance on our Security Certifications page. Information Security Policy  Symantec is committed to the protection of the company's information ...
new blog entry 21 May 2015
Our Global Service Provider team will be a platinum sponsor at this year's Big Telecom Event (sponsored by Light Reading) in Chicago, June 9-10, 2015 where we'll be focusing on our Information Protection story at our Booth #520.  In addition, Symantec will be participating on two panel session: Tuesday, June 9 – 3:00-4:00 pm - Dealing with DDOS and Advanced ...
updated blog entry 21 May 2015
We know what to do when the fire alarm sounds, but what if the sparks are on our desktop? Developing an active Phishing Campaign for the enterprise is akin to a fire drill practice and should become second nature. Cyber-crime organisations, nation states and hactivism all use similar toolsets to get what they want. The scatter gun approach is no longer as pervasive as it once was. Intellectual ...
updated blog entry 20 May 2015
A few weeks ago at the RSA Conference 2015, the OpenID Foundation announced the launch of its OpenID Connect Certification, an important program that enables organizations to certify that their OpenID Connect implementations conform to specified profiles of the OpenID Connect standard. We are pleased to announce that Symantec is hosting this self-certification process and providing the ...
updated blog entry 19 May 2015
An average car produces about 1.1 pounds of CO2 emissions per mile – a bike releases none. Biking five days a week for a full year could save between .7 – 1.9 Tons of CO2. Not only is biking a green way to travel, it is also great for your health. A San Francisco Bay Area study found that increasing biking and walking from 4 to 24 minutes a day on average would reduce cardiovascular disease ...
updated blog entry 15 May 2015
The Global Reporting Initiative (GRI) Sustainability Reporting Guidelines are the most widely used comprehensive sustainability standard in the world. This type of sustainability report conveys disclosures on an organization’s most critical impacts (positive and negative) on the environment, society, and the economy. The fourth generation of these Guidelines (G4) was launched in May 2013 with ...
updated blog entry 14 May 2015
Youth unemployment is at a shocking 12.3 percent - double the national unemployment rate – and has remained at a high rate over the past couple years despite falling national unemployment rates. Youth employment not only impacts an individual’s confidence and skills-development, it also impacts their future earning potential. It’s no wonder that youth employment is a major concern. On top ...
updated blog entry 11 May 2015
Symantec’s Enterprise Security consists of three important areas: Threat Protection, Information Protection and Cyber Security Services – all built on Symantec’s Unified Security Platform, and all designed to work together to keep data secure in an unsafe world. Symantec Enterprise Security: Threat Protection, Information Protection & Cyber Security Services Symantec Information Protection – ...
updated blog entry 07 May 2015
When a new year rolls around, people gather together to celebrate and reflect on the highlights of the past year. Symantec’s 2015 fiscal year wrapped up in March and we’ve got our sleeves rolled up and ready to take on new opportunities! But let’s just take a brief pause to tour some of FY15’s media highlights: Symantec launches cybersecurity program to bridge workforce gap : Last June, ...
updated blog entry 05 May 2015
Today is Silicon Valley Gives Day, a 24-hour giving bonanza created to benefit charities throughout Silicon Valley. Last year, over 600 local nonprofits benefited from the first-ever event, raising $8 million in the 24-hour period! Symantec will be matching the first $10,000 in donations to Techbridge Girls given on svgives.razoo.com. Symantec employees can triple their impact to ...
new blog entry 04 May 2015
Technology-driven security was right at the heart of the recent INTERPOL World Congress – with cybersecurity and Symantec’s leading solutions a key focus. A key message to come out of the event was that, with more than 60,000 incidents of malware software created daily to infiltrate security systems, global efforts must now enhance cybersecurity through robust partnerships between law ...
new event 20 Apr 2015
Visit Booth #3811 in the North Hall to experience our exciting new Cybersecurity Simulation offering. Learn more about how Symantec can protect organizations from Advanced Persistent Threats while keeping their information safe in the era of the Internet of Things. Visit our Cybersecurity Operations Center and join our Security Analysts as they identify malicious activity and walk through a ...
new event 24 Mar 2015
Veritas Technologies Corporation, the independent information management company that will emerge once the separation from Symantec is complete, is ready to preview its product strategy with select industry analysts. The Veritas business will continue to invest in its leading core products and deliver them however enterprises want to buy them, whether it’s in the cloud, on-premise ...
new event 18 Dec 2014
Symantec will be at the upcoming Mobile World Congress industry event taking place in Barcelona on 2-5 March 2015, sharing some exciting updates around Symantec’s mobile offerings. If you are interested to connect with our mobile executives and experts to discuss our latest product offerings and trends please contact Lourdes_Johnson@symantec.com or Patricia_Valuch@symantec.com in the Analyst ...
new event 01 Dec 2014
Any device, any time, any place productivity.  The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives.  To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming ...
new event 04 Nov 2014
On 9th October Symantec announced that its Board of Directors has unanimously approved a plan to separate the company into two, independent publicly traded companies: one business focused on Security and one business focused on Information Management (IM). As the industry landscape continues to change at a rapid pace, the Security and IM businesses each face unique competitive opportunities ...
new event 03 Nov 2014
Any device, any time, any place productivity. The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives. To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming another ...
updated event 25 Aug 2014
This year, Symantec will be in Booth 1635. Meet with our experts and discuss key market trends and updates from Symantec. See the full schedule here: http://bit.ly/1lrn09o If you are an industry analyst and interested to speak with Symantec, please contact: Chhavi_Ahuja@symantec.com or Kurt_Mumma@symantec.com in the Analyst Relations team to schedule a meeting. We look forward to seeing you ...
updated event 04 Aug 2014
Symantec leaders will be on hand to discuss market trends, issues, and provide updates on Symantec in Mobile. If you are an industry analyst and interested to meet with our experts please do connect with us by emailing Lourdes_Johnson@symantec.com to request a meeting. Symantec Sponsorships & Thought Leadership Sessions CIO Summit - September 9, 2014 1:15 – 2:15 pm: Combining Mobility ...
new event 17 Sep 2013
In a survey of 80 health care organizations in the U.S., the Ponemon Institute found that nearly three-quarters said they don’t secure their medical devices, even though they contain sensitive patient data and perform critical care functions. It has been demonstrated that hackers can tap into devices such as pacemakers and insulin pumps, the FDA warned. In addition to malicious attacks, ...
new event 25 Jun 2013
Symantec Cyber Week: La Protezione dei sistemi critici   Luca Rossi, TSO Specialist, Symantec Italia   Perchè i Server? La Protezione dei sistemi critici La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la ...
updated video 24 Jan 2014
The Omnibus Final Rule put into effect on September 23, 2013, modified HIPAA’s previous requirements and impacts the HIPAA Privacy and Security Rules. In addition to finalizing Breach Notification, Omnibus also significantly increases Civil Monetary Penalties (CMPs) and changes how they are applied. Changes to the definition of Business Associates has meant significant adjustments for many ...
updated video 23 Sep 2013
How to download, run and use SymHelp to diagnose common Symantec product issues. For additional information on running self-help reports with SymHelp please visit: How to run and use Symantec Help reports http://www.symantec.com/docs/TECH210694
updated video 16 Aug 2013
Symantec's Gigi Schumm appeared on Government Contracting Weekly where she speaks on her career background and Symantec's role in protecting the worlds people and information.  Government Contracting Weekly is sponsored by AOC Key Solutions.  To learn more, visit www.governmentcontractingweekly.com
updated video 16 Jun 2013
This four minute video describes how to register for Symantec Connect, log in, set your profile information and manage notifications.
new idea 18 May 2015
We would like to have VSERVER support in BackupExec for NDMP backups. We always use BackupExec to make backups (via NDMP) from NetApp secondary systems (Vault systems). Since NetApp Clustered DataOntap the default mode is VSERVER but BackupExec does not support this and we have to change the modus to Node mode. With this mode, other NetApp products do not function correctly. So my question is, ...
new idea 29 Dec 2014
The ability to schedule multiple implementation sub-tasks to users or groups after a change has been approved. Currently this is partially available but only once the change has started. Customer requires to add the tasks before the changed must be implemented as users are scattered globally and require notification once a change is scheduled/approved to see what tasks are assigned to them and ...
new idea 15 Dec 2014
Make the SymAccount login available across the entire Symantec.com website. If I have to navigate to several different places at Symantec.com, I have to login with the same SymAccount at all of those places. Just this morning I logged in to change email preferences because I was getting spammed by Symantec about third-party products. After that, I came to Connect. Same SymAccount, and I had to ...