Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.
updated article 27 Apr 2015
Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Symantec centralized certification management program globally.  Our global staff of certification professionals actively promotes awareness ...
updated article 24 Apr 2015
Federal Risk and Authorization Management Program (FedRAMP) Symantec Product Status Symantec Validation and Identity Protection (VIP) In Progress The Federal Risk and Authorization Management Program, or FedRAMP, is a government-wide program (www.fedramp.gov) that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products ...
updated article 24 Apr 2015
Common Criteria The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach to the evaluations of information technology products and protection profiles for information assurance and security. This arrangement benefits member nation governments and other customers of IT products by creating more clarity in procurement ...
updated article 24 Apr 2015
UK Cyber Essentials Background:  From 1 October 2014, the UK government has made it mandatory that all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme. The scheme’s five security controls apply to: Access Control Malware Protection Patch Management Secure Configuration Boundary Firewall and Internet ...
updated article 24 Apr 2015
Federal Identity, Credential and Access Management (FICAM) Trust Framework Solutions (TFS) The FICAM TFS (http://idmanagement.gov/trust-framework-solutions) is the federated identity framework for the U.S. Federal Government. It includes guidance, processes, and supporting infrastructure to enable secure and streamlined citizen and business facing online service delivery. The following ...
updated article 24 Apr 2015
Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Federal Government.   If you don't have a certificate or at least demonstrate a commitment to obtaining one, then there is a good ...
updated article 24 Apr 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
updated blog entry 24 Apr 2015
Today we celebrate Earth Day’s 45th anniversary by highlighting a variety of activities that demonstrate Symantec’s commitment to environmental stewardship and promoting the future sustainability of our planet. From the culmination of our One Mug, One Planet campaign, to shutting down the water feature in the Mountain View headquarters’ courtyard, to the launch of our employee sustainability ...
updated article 23 Apr 2015
VPAT™ Voluntary Product Accessibility Templates The purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial “Electronic and Information Technology” products and services with features that support accessibility. Symantec supports the U.S. ...
discussion comment 22 Apr 2015
updated discussion 13 Apr 2015
Hi, Does anyone can help me with some info on what the difference is between Symantec Norton Internet Security 2011 NIS 1yr 1PC 2010 and Norton Antivirus 2008? I used the 2008 version to update my computer, but now they are coming up with the what is the Symantec Norton Internet Security 2011 NIS 1yr 1PC 2010 and I am not sure about the difference. Is it the same software just newer version or ...
updated article 27 Apr 2015
Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Symantec centralized certification management program globally.  Our global staff of certification professionals actively promotes awareness ...
updated article 24 Apr 2015
Federal Risk and Authorization Management Program (FedRAMP) Symantec Product Status Symantec Validation and Identity Protection (VIP) In Progress The Federal Risk and Authorization Management Program, or FedRAMP, is a government-wide program (www.fedramp.gov) that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products ...
updated article 24 Apr 2015
Common Criteria The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach to the evaluations of information technology products and protection profiles for information assurance and security. This arrangement benefits member nation governments and other customers of IT products by creating more clarity in procurement ...
updated article 24 Apr 2015
UK Cyber Essentials Background:  From 1 October 2014, the UK government has made it mandatory that all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme. The scheme’s five security controls apply to: Access Control Malware Protection Patch Management Secure Configuration Boundary Firewall and Internet ...
updated article 24 Apr 2015
Federal Identity, Credential and Access Management (FICAM) Trust Framework Solutions (TFS) The FICAM TFS (http://idmanagement.gov/trust-framework-solutions) is the federated identity framework for the U.S. Federal Government. It includes guidance, processes, and supporting infrastructure to enable secure and streamlined citizen and business facing online service delivery. The following ...
updated article 24 Apr 2015
Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Federal Government.   If you don't have a certificate or at least demonstrate a commitment to obtaining one, then there is a good ...
updated article 24 Apr 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
updated article 23 Apr 2015
VPAT™ Voluntary Product Accessibility Templates The purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial “Electronic and Information Technology” products and services with features that support accessibility. Symantec supports the U.S. ...
updated article 23 Mar 2015
This page contains our most frequently requested public facing documentation.  Users that have accepted our Non-Disclosure Agreement (NDA) may access confidential data such as ISO/IEC 27001 certifications, SOC reports and evidence of insurance on our Security Certifications page. Information Security Policy  Symantec is committed to the protection of the company's information ...
updated article 16 Mar 2015
Symantec protects the world's people and information by conducting our business with a committment to ethical operation, promoting a diverse and inclusive workplace, practicing sound environmental management and investing in positive social impact around the globe.  We've published the answers to some of our most frequently asked questions related to Corporate Responsibility below, but ...
updated blog entry 24 Apr 2015
Today we celebrate Earth Day’s 45th anniversary by highlighting a variety of activities that demonstrate Symantec’s commitment to environmental stewardship and promoting the future sustainability of our planet. From the culmination of our One Mug, One Planet campaign, to shutting down the water feature in the Mountain View headquarters’ courtyard, to the launch of our employee sustainability ...
new blog entry 23 Apr 2015
Today the International Telecommunication Union (ITU), the United Nations specialized agency for information and communication technologies, celebrates its annual Girls in ICT Day that aims to “empower and encourage girls and young women to consider studies and careers in the growing field of ICTs”. The goal of this day is to “make girls and young women aware of the vast possibilities offered ...
updated blog entry 22 Apr 2015
Here you can gain relevant and timely information related to Symantec’s business and products to support you with your research. More Details Symantec to Separate Into Two Focused, Industry-Leading Technology Companies Update – February 2015 On January 28, we announced that the new information management company would be known as Veritas Technologies Corporation. We have begun to realign the ...
updated blog entry 22 Apr 2015
The Events section provides information about new product launches, analyst events and other Symantec events that are relevant to you. More Details _________________________________________________________________________________________ Upcoming Events & Symantec Webcasts April 20, 2015 RSA® Conference 2015 (Visit Symantec in booth # 3811 North Expo Hall) San Francisco, California April ...
updated blog entry 21 Apr 2015
It’s an exciting time at Symantec. Like the start of a new baseball season, we’re entering the RSA Conference 2015 with a fresh lineup of upcoming offerings that further advance our Unified Security vision: SymGauge and Quantitative Security (aka Moneyball for Security) And we believe they’re Home Runs for the whole industry. SymGauge and Quantitative Security are each being built on top of ...
updated blog entry 16 Apr 2015
Who me, biased? Yes, you. Well not just you, all of us. Most of you are probably thinking – I am the exception. I know I thought that when I first heard this. However, through my role as a diversity leader I have been challenged to think about equality and diversity differently, to seek out the latest research on what drives inequalities in our company, our industry and society. Here is what ...
updated blog entry 15 Apr 2015
April 2015 - Press Releases 04/13 Symantec Expands Incident Response Services Globally 04/13 Deceptive New Tactics Give Advanced Attackers Free Reign Over Corporate Networks 04/06 Symantec to Webcast Quarterly Earnings Call News/Articles Microsoft and Symantec Alliance March 2015 - Press Releases 03/03 Norton Earns AV-TEST Innovation Award For Protecting ...
updated blog entry 14 Apr 2015
The Symantec Service Corps Turkey team has returned from their month-long pro bono assignment, and is settling back in to their roles at Symantec. Here, Shantanu Gattani, one of the participants, shares his final reflections on his experience. Symantec Service Corps (SSC) 2015 has been officially over for a few weeks now, and the team is back in their respective homes. As I reflect on my ...
updated blog entry 14 Apr 2015
Here you can view customers case studies and success stories to see how Symantec customers use our products and solutions within their organizations. More Details If you wish to speak with a  Symantec customer please contact the Symantec Analyst Relations team   Customer Case Study Symantec Webcast: Why PCI/DSS needs to be part of a bigger security strategy Presenter: Tom Davison, ...
new event 20 Apr 2015
Visit Booth #3811 in the North Hall to experience our exciting new Cybersecurity Simulation offering. Learn more about how Symantec can protect organizations from Advanced Persistent Threats while keeping their information safe in the era of the Internet of Things. Visit our Cybersecurity Operations Center and join our Security Analysts as they identify malicious activity and walk through a ...
new event 24 Mar 2015
Veritas Technologies Corporation, the independent information management company that will emerge once the separation from Symantec is complete, is ready to preview its product strategy with select industry analysts. The Veritas business will continue to invest in its leading core products and deliver them however enterprises want to buy them, whether it’s in the cloud, on-premise ...
new event 18 Dec 2014
Symantec will be at the upcoming Mobile World Congress industry event taking place in Barcelona on 2-5 March 2015, sharing some exciting updates around Symantec’s mobile offerings. If you are interested to connect with our mobile executives and experts to discuss our latest product offerings and trends please contact Lourdes_Johnson@symantec.com or Patricia_Valuch@symantec.com in the Analyst ...
new event 01 Dec 2014
Any device, any time, any place productivity.  The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives.  To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming ...
new event 04 Nov 2014
On 9th October Symantec announced that its Board of Directors has unanimously approved a plan to separate the company into two, independent publicly traded companies: one business focused on Security and one business focused on Information Management (IM). As the industry landscape continues to change at a rapid pace, the Security and IM businesses each face unique competitive opportunities ...
new event 03 Nov 2014
Any device, any time, any place productivity. The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives. To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming another ...
updated event 25 Aug 2014
This year, Symantec will be in Booth 1635. Meet with our experts and discuss key market trends and updates from Symantec. See the full schedule here: http://bit.ly/1lrn09o If you are an industry analyst and interested to speak with Symantec, please contact: Chhavi_Ahuja@symantec.com or Kurt_Mumma@symantec.com in the Analyst Relations team to schedule a meeting. We look forward to seeing you ...
updated event 04 Aug 2014
Symantec leaders will be on hand to discuss market trends, issues, and provide updates on Symantec in Mobile. If you are an industry analyst and interested to meet with our experts please do connect with us by emailing Lourdes_Johnson@symantec.com to request a meeting. Symantec Sponsorships & Thought Leadership Sessions CIO Summit - September 9, 2014 1:15 – 2:15 pm: Combining Mobility ...
new event 17 Sep 2013
In a survey of 80 health care organizations in the U.S., the Ponemon Institute found that nearly three-quarters said they don’t secure their medical devices, even though they contain sensitive patient data and perform critical care functions. It has been demonstrated that hackers can tap into devices such as pacemakers and insulin pumps, the FDA warned. In addition to malicious attacks, ...
new event 25 Jun 2013
Symantec Cyber Week: La Protezione dei sistemi critici   Luca Rossi, TSO Specialist, Symantec Italia   Perchè i Server? La Protezione dei sistemi critici La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la ...
updated video 24 Jan 2014
The Omnibus Final Rule put into effect on September 23, 2013, modified HIPAA’s previous requirements and impacts the HIPAA Privacy and Security Rules. In addition to finalizing Breach Notification, Omnibus also significantly increases Civil Monetary Penalties (CMPs) and changes how they are applied. Changes to the definition of Business Associates has meant significant adjustments for many ...
updated video 23 Sep 2013
How to download, run and use SymHelp to diagnose common Symantec product issues. For additional information on running self-help reports with SymHelp please visit: How to run and use Symantec Help reports http://www.symantec.com/docs/TECH210694
updated video 16 Aug 2013
Symantec's Gigi Schumm appeared on Government Contracting Weekly where she speaks on her career background and Symantec's role in protecting the worlds people and information.  Government Contracting Weekly is sponsored by AOC Key Solutions.  To learn more, visit www.governmentcontractingweekly.com
updated video 16 Jun 2013
This four minute video describes how to register for Symantec Connect, log in, set your profile information and manage notifications.
updated idea 23 Apr 2015
Presently, it is difficult to locate a particular blog. When I click on a particular author, I am presented with a list of years for which the author has written blogs. If I click on the year, I get a list of months in this year which have blogs from the author. It is unlikely that I know the month and the year of a particular blog that I want to find. Clicking on the wrong month/year means ...
new idea 29 Dec 2014
The ability to schedule multiple implementation sub-tasks to users or groups after a change has been approved. Currently this is partially available but only once the change has started. Customer requires to add the tasks before the changed must be implemented as users are scattered globally and require notification once a change is scheduled/approved to see what tasks are assigned to them and ...
new idea 15 Dec 2014
Make the SymAccount login available across the entire Symantec.com website. If I have to navigate to several different places at Symantec.com, I have to login with the same SymAccount at all of those places. Just this morning I logged in to change email preferences because I was getting spammed by Symantec about third-party products. After that, I came to Connect. Same SymAccount, and I had to ...