Video Screencast Help
new idea 01 Sep 2015
SAIREX26 posted: CFO
Established, Pandiyan, Sundeep. Millen Assistive Directive Mainframe(ADM). it's been optimal w/ no threats. and has maintained no intrusions.
updated article 31 Aug 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
new blog entry 27 Aug 2015
What did you do this summer? For most people, summer is their favorite season of the year. And why not – it means long sun-filled days, barbeques and picnics in the park, and holiday time. This summer, Symantec employees from the Green Park office in the UK spent some of their summer time using their skills for charity. The Sales team exercised their savvy business skills in a friendly ...
new blog entry 25 Aug 2015
Vote Now! We’re giving away a $10,000 grant to one of our nonprofit partners, and you tell us where it goes! Just visit our stakeholder feedback survey and answer a few, very brief questions about the content of our FY15 Corporate Responsibility Report, and vote for the nonprofit of your choice. Corporate responsibility is about more, not less: more value creation, more ...
updated blog entry 25 Aug 2015
Most organisations already have more information than they can handle and the rate at which this is expanding is staggering – yet many are struggling to understand exactly what that data is, and how to control and manage it. Failure to put the right policies and procedures in place can lead to chaos, whereas the most successful businesses know exactly where their data resides – cloud, ...
updated blog entry 24 Aug 2015
当下,接连不断的网络攻击差不多已司空见惯,网络安全也随之成为舆论关注的焦点。所有企业现在都在担心自己会不会成为下一条新闻的主角,而不再是隔岸观火的旁观者。 安全解决方案难以落实的一大难题在于很难拿到企业预算,问题往往出在董事会对待安全的看法上。多年来甚至到今天,安全产品和解决方案都被视为以防万一的“保险”,这种观念亟需转变。保险是所有人都心不甘情不愿的必购品, ...
new event 23 Aug 2015
Symantec has been a leader in cyber security simulation – the gamification of skills assessment and development through the use of immersive, hands-on infrastructure and situations using realistic, virtualized systems, networks and applications for attack, defense, incident response and more.  Join our Cyber Security Simulation Product Management team to hear about how Symantec ...
updated blog entry 21 Aug 2015
サイバー攻撃は日常的に発生しており、サイバーセキュリティは注目を集めるニュースとなっています。今や企業は、他の企業が攻撃の標的となったことをニュースで知るだけでなく、自社も同じ理由でニュースになってしまうリスクに直面しています。 セキュリティソリューションの最大の課題の 1 ...
updated discussion 17 Aug 2015
Hi, My Email ID that was registed with Connect is now expired. My Office has given me a new email ID. I have forgotten my password, clicking forgot password sends the temp paswrd to my old email. Pls Help me.
updated discussion 11 Aug 2015
I am not sure which community this should go in but, I am trying to set up an image for a computer training room that will be used on 10-15 different computers.  My question is, am I able to just make one image, then push that image to the computers?  The only thing that I can think of that would not allow this is the fact that the other computers would then be using the same windows ...
updated discussion 06 Aug 2015
Hi, I am looking to buy a product for a single w2k3 server I have setup at home. I use it for web development as a staging and  testing environment and I would like a product to protect against viruses etc. Can someone advise me on the right product to meet this need, without costing me the earth as this is only for home use. I also want something that isnt going to be easily reinstalled ...
discussion comment 19 Jun 2015
updated discussion 02 Jun 2015
I have downloaded PCAnywhere Trialware softeware which has expired how can I purchase this so that I can use this permanently whenever I try I select the shortcut which "This version expired on Thursday, October 27,2011. You will need to purchase a copy in order to continue using this product. Can I register the trialware online and purchase this similar to other software
updated article 31 Aug 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
updated article 17 Aug 2015
The Federal Service for Technical and Export Control (FSTEK) certification is required in order to sell information security systems in Russia. The regulations covering these requirements were  introduced by the Russian government  in July 2011. The Russian government  introduced  these requirements to ensure that establishments handling personal/confidential/government ...
updated article 17 Aug 2015
VPAT™ Voluntary Product Accessibility Templates The purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial “Electronic and Information Technology” products and services with features that support accessibility. Symantec supports the U.S. ...
updated article 03 Aug 2015
Symantec protects the world’s people and information by conducting our business with a commitment to ethical operation, promoting a diverse and inclusive workplace, practicing sound environmental management and investing in positive social impact around the globe. Our corporate responsibility platform is organized into three pillars: Our People, Your Information, and The World. We welcome ...
updated article 20 Jul 2015
Common Criteria The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach to the evaluations of information technology products and protection profiles for information assurance and security. This arrangement benefits member nation governments and other customers of IT products by creating more clarity in procurement ...
updated article 12 Jun 2015
This page contains our most frequently requested public facing documentation.  Users that have accepted our Non-Disclosure Agreement (NDA) may access confidential data such as ISO/IEC 27001 certifications, SOC reports and evidence of insurance on our Security Certifications page. Information Security Policy  Symantec is committed to the protection of the company's information ...
updated article 19 May 2015
Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Symantec centralized certification management program globally.  Our global staff of certification professionals actively promotes awareness ...
updated article 05 May 2015
Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Federal Government.   If you don't have a certificate or at least demonstrate a commitment to obtaining one, then there is a good ...
new blog entry 27 Aug 2015
What did you do this summer? For most people, summer is their favorite season of the year. And why not – it means long sun-filled days, barbeques and picnics in the park, and holiday time. This summer, Symantec employees from the Green Park office in the UK spent some of their summer time using their skills for charity. The Sales team exercised their savvy business skills in a friendly ...
new blog entry 25 Aug 2015
Vote Now! We’re giving away a $10,000 grant to one of our nonprofit partners, and you tell us where it goes! Just visit our stakeholder feedback survey and answer a few, very brief questions about the content of our FY15 Corporate Responsibility Report, and vote for the nonprofit of your choice. Corporate responsibility is about more, not less: more value creation, more ...
updated blog entry 25 Aug 2015
Most organisations already have more information than they can handle and the rate at which this is expanding is staggering – yet many are struggling to understand exactly what that data is, and how to control and manage it. Failure to put the right policies and procedures in place can lead to chaos, whereas the most successful businesses know exactly where their data resides – cloud, ...
updated blog entry 24 Aug 2015
当下,接连不断的网络攻击差不多已司空见惯,网络安全也随之成为舆论关注的焦点。所有企业现在都在担心自己会不会成为下一条新闻的主角,而不再是隔岸观火的旁观者。 安全解决方案难以落实的一大难题在于很难拿到企业预算,问题往往出在董事会对待安全的看法上。多年来甚至到今天,安全产品和解决方案都被视为以防万一的“保险”,这种观念亟需转变。保险是所有人都心不甘情不愿的必购品, ...
updated blog entry 21 Aug 2015
サイバー攻撃は日常的に発生しており、サイバーセキュリティは注目を集めるニュースとなっています。今や企業は、他の企業が攻撃の標的となったことをニュースで知るだけでなく、自社も同じ理由でニュースになってしまうリスクに直面しています。 セキュリティソリューションの最大の課題の 1 ...
new blog entry 20 Aug 2015
In June of last year, we launched the Symantec Cyber Career Connection (SC3). Twelve months later, our first class of SC3 students are graduating! Today we hear from Sobia Shaikh, who joined the SC3 program through YearUp, our nonprofit partner. My name is Sobia Shaikh and I currently work at Juniper Networks as an IT Security Compliance Intern. I never would’ve imagined that I would be ...
new blog entry 18 Aug 2015
We can easily donate money or give hardware, but it’s the time that we give that really gets young people going. About five years ago what started as occasional volunteering at my son’s robotics after-school program has morphed into a full force nonprofit program that exposes middle and high school students to hands-on engineering and technology projects. As a parent of two children, I have ...
updated blog entry 17 Aug 2015
In my last blog I talked about some of the impacts cyber security can have on an organisation, the emerging trends we are seeing at a board level and the lack of visibility today’s CISO’s are suffering from.   The CISO’s lack of visibility as described in my previous blog certainly helps to explain some of the interesting security investment trending we are seeing at present. ...
updated blog entry 17 Aug 2015
多くの企業にとって、データの急増は手に負えないものになりつつあります。企業が収集するデータの量は増え続け、収集の速度も上がり続けています。同時に、企業はこれまで以上にデータに依存するようになっています。これらのデータすべてを保存するために、世界中でデータセンターの建設が進む一方で、保存されているデータの 3 分の 2 は役に立たないことが調査により明らかになっています。そこで Veritas の出番です。 2020 年までに、世界には 44 ゼタバイトを超えるデータが存在することになると考えられており、Veritas の情報管理サービスに対する需要はこれまでにないほど高まっています。IT 部門は現在のアプローチではもうデータを管理することができなくなります。財源も人的資源もまったく足りません。Veritas ではこの課題に対処できるようにビジネスを構築しています。Veritas ...
new event 23 Aug 2015
Symantec has been a leader in cyber security simulation – the gamification of skills assessment and development through the use of immersive, hands-on infrastructure and situations using realistic, virtualized systems, networks and applications for attack, defense, incident response and more.  Join our Cyber Security Simulation Product Management team to hear about how Symantec ...
updated event 11 Aug 2015
Please join us for a live webinar for industry analysts hosted by Jeff Scheel, Senior Vice President, Corporate Strategy and Amit Jasuja, Senior Vice President, Product Development. We will discuss the strategy and direction for Symantec enterprise security solutions and you will also have the opportunity to ask questions. When: 18th August, 8am PST / 11 am EDT / 4pm GMT Industry Analysts ...
updated event 11 Aug 2015
Vision is right around the corner, so it’s time to start getting ready for the 8th annual User Group Challenge. This year’s competition is based off of the game show Minute to Win It, and will reveal which User Group can think fast under pressure, work together as a team, and since we’ll be in Las Vegas has a little luck on its side. If you haven’t registered for Vision ...
updated event 16 Jul 2015
Symantec will be at Black Hat USA 2015 taking place on 1-6 August 2015 in Las Vegas, NV. Join our security researchers and experts as they share their analysis of the latest cyber threats, trends and attackers. Visit Symantec’s booth and learn how Symantec can help organizations get in front of an attack – not just detect, assess and respond to a threat. Industry Analysts interested in ...
new event 20 Apr 2015
Visit Booth #3811 in the North Hall to experience our exciting new Cybersecurity Simulation offering. Learn more about how Symantec can protect organizations from Advanced Persistent Threats while keeping their information safe in the era of the Internet of Things. Visit our Cybersecurity Operations Center and join our Security Analysts as they identify malicious activity and walk through a ...
new event 24 Mar 2015
Veritas Technologies Corporation, the independent information management company that will emerge once the separation from Symantec is complete, is ready to preview its product strategy with select industry analysts. The Veritas business will continue to invest in its leading core products and deliver them however enterprises want to buy them, whether it’s in the cloud, on-premise ...
new event 18 Dec 2014
Symantec will be at the upcoming Mobile World Congress industry event taking place in Barcelona on 2-5 March 2015, sharing some exciting updates around Symantec’s mobile offerings. If you are interested to connect with our mobile executives and experts to discuss our latest product offerings and trends please contact Lourdes_Johnson@symantec.com or Patricia_Valuch@symantec.com in the Analyst ...
new event 01 Dec 2014
Any device, any time, any place productivity.  The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives.  To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming ...
new event 04 Nov 2014
On 9th October Symantec announced that its Board of Directors has unanimously approved a plan to separate the company into two, independent publicly traded companies: one business focused on Security and one business focused on Information Management (IM). As the industry landscape continues to change at a rapid pace, the Security and IM businesses each face unique competitive opportunities ...
new event 03 Nov 2014
Any device, any time, any place productivity. The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives. To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming another ...
updated video 24 Jan 2014
The Omnibus Final Rule put into effect on September 23, 2013, modified HIPAA’s previous requirements and impacts the HIPAA Privacy and Security Rules. In addition to finalizing Breach Notification, Omnibus also significantly increases Civil Monetary Penalties (CMPs) and changes how they are applied. Changes to the definition of Business Associates has meant significant adjustments for many ...
updated video 23 Sep 2013
How to download, run and use SymHelp to diagnose common Symantec product issues. For additional information on running self-help reports with SymHelp please visit: How to run and use Symantec Help reports http://www.symantec.com/docs/TECH210694
updated video 16 Aug 2013
Symantec's Gigi Schumm appeared on Government Contracting Weekly where she speaks on her career background and Symantec's role in protecting the worlds people and information.  Government Contracting Weekly is sponsored by AOC Key Solutions.  To learn more, visit www.governmentcontractingweekly.com
updated video 16 Jun 2013
This four minute video describes how to register for Symantec Connect, log in, set your profile information and manage notifications.
new idea 01 Sep 2015
SAIREX26 posted: CFO
Established, Pandiyan, Sundeep. Millen Assistive Directive Mainframe(ADM). it's been optimal w/ no threats. and has maintained no intrusions.