Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.
updated discussion 05 May 2015
Hi! I can't open my Manage Case page on My Symantec Portal. I already updated my browser. Thanks!
updated article 05 May 2015
Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Federal Government.   If you don't have a certificate or at least demonstrate a commitment to obtaining one, then there is a good ...
updated article 05 May 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
updated blog entry 05 May 2015
Today is Silicon Valley Gives Day, a 24-hour giving bonanza created to benefit charities throughout Silicon Valley. Last year, over 600 local nonprofits benefited from the first-ever event, raising $8 million in the 24-hour period! Symantec will be matching the first $10,000 in donations to Techbridge Girls given on svgives.razoo.com. Symantec employees can triple their impact to ...
updated blog entry 04 May 2015
Symantec at the RSA Conference 2015 Protecting all the connected things What are the biggest challenges are for IT Pros when it comes to Threat Protection Symantec’s work in improving efficiencies and securing data centers and in the public and private cloud How is the Data Center is evolving into virtual, cloud, hybrid and beyond Importance to be looking outside the security walls of the ...
new blog entry 04 May 2015
Technology-driven security was right at the heart of the recent INTERPOL World Congress – with cybersecurity and Symantec’s leading solutions a key focus. A key message to come out of the event was that, with more than 60,000 incidents of malware software created daily to infiltrate security systems, global efforts must now enhance cybersecurity through robust partnerships between law ...
new blog entry 01 May 2015
May is Asian-Pacific American Heritage Month in the United States, and we would like to take the opportunity to celebrate the generations of Asian Americans who have contributed to building the United States as a nation, and to celebrate our employees in the APJ and India regions, for their innovations and contributions to Symantec. We begin this two-part series with a look at the origin of ...
updated discussion 05 May 2015
Hi! I can't open my Manage Case page on My Symantec Portal. I already updated my browser. Thanks!
discussion comment 22 Apr 2015
updated discussion 13 Apr 2015
Hi, Does anyone can help me with some info on what the difference is between Symantec Norton Internet Security 2011 NIS 1yr 1PC 2010 and Norton Antivirus 2008? I used the 2008 version to update my computer, but now they are coming up with the what is the Symantec Norton Internet Security 2011 NIS 1yr 1PC 2010 and I am not sure about the difference. Is it the same software just newer version or ...
updated article 05 May 2015
Reasons for Obtaining the FIPS 140-2 Validation There are many reasons why a product requires FIPS 140-2 validation, and the compelling one is regulatory.  FIPS 140-2 evaluation is required for sale of products implementing cryptography to the Federal Government.   If you don't have a certificate or at least demonstrate a commitment to obtaining one, then there is a good ...
updated article 05 May 2015
FIPS 140-2 Federal Information Processing Standard 140-2 (FIPS 140-2) validation is important to any vendor selling cryptography to the Federal market space. If your IT product utilizes any form of encryption, it will likely require validation against the FIPS 140-2 criteria by the Cryptographic Module Validation Program (CMVP) run jointly by the National Institute of Standards and Technology ...
updated article 29 Apr 2015
UK Cyber Essentials Background:  From 1 October 2014, the UK government has made it mandatory that all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme. The scheme’s five security controls apply to: Access Control Malware Protection Patch Management Secure Configuration Boundary Firewall and Internet ...
updated article 29 Apr 2015
Federal Risk and Authorization Management Program (FedRAMP) Symantec Product Status Symantec Validation and Identity Protection (VIP) In Progress The Federal Risk and Authorization Management Program, or FedRAMP, is a government-wide program (www.fedramp.gov) that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products ...
updated article 29 Apr 2015
Federal Identity, Credential and Access Management (FICAM) Trust Framework Solutions (TFS) The FICAM TFS (http://idmanagement.gov/trust-framework-solutions) is the federated identity framework for the U.S. Federal Government. It includes guidance, processes, and supporting infrastructure to enable secure and streamlined citizen and business facing online service delivery. The following ...
updated article 29 Apr 2015
Common Criteria The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach to the evaluations of information technology products and protection profiles for information assurance and security. This arrangement benefits member nation governments and other customers of IT products by creating more clarity in procurement ...
updated article 27 Apr 2015
Symantec's Global Certification Management Program Office As part of the Symantec CTO Organization/Security Technology and Response (STaR) Department, a key responsibility is to oversee, maintain, and enhance through best practices employed our Symantec centralized certification management program globally.  Our global staff of certification professionals actively promotes awareness ...
updated article 23 Apr 2015
VPAT™ Voluntary Product Accessibility Templates The purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial “Electronic and Information Technology” products and services with features that support accessibility. Symantec supports the U.S. ...
updated article 23 Mar 2015
This page contains our most frequently requested public facing documentation.  Users that have accepted our Non-Disclosure Agreement (NDA) may access confidential data such as ISO/IEC 27001 certifications, SOC reports and evidence of insurance on our Security Certifications page. Information Security Policy  Symantec is committed to the protection of the company's information ...
updated article 16 Mar 2015
Symantec protects the world's people and information by conducting our business with a committment to ethical operation, promoting a diverse and inclusive workplace, practicing sound environmental management and investing in positive social impact around the globe.  We've published the answers to some of our most frequently asked questions related to Corporate Responsibility below, but ...
updated blog entry 05 May 2015
Today is Silicon Valley Gives Day, a 24-hour giving bonanza created to benefit charities throughout Silicon Valley. Last year, over 600 local nonprofits benefited from the first-ever event, raising $8 million in the 24-hour period! Symantec will be matching the first $10,000 in donations to Techbridge Girls given on svgives.razoo.com. Symantec employees can triple their impact to ...
updated blog entry 04 May 2015
Symantec at the RSA Conference 2015 Protecting all the connected things What are the biggest challenges are for IT Pros when it comes to Threat Protection Symantec’s work in improving efficiencies and securing data centers and in the public and private cloud How is the Data Center is evolving into virtual, cloud, hybrid and beyond Importance to be looking outside the security walls of the ...
new blog entry 04 May 2015
Technology-driven security was right at the heart of the recent INTERPOL World Congress – with cybersecurity and Symantec’s leading solutions a key focus. A key message to come out of the event was that, with more than 60,000 incidents of malware software created daily to infiltrate security systems, global efforts must now enhance cybersecurity through robust partnerships between law ...
new blog entry 01 May 2015
May is Asian-Pacific American Heritage Month in the United States, and we would like to take the opportunity to celebrate the generations of Asian Americans who have contributed to building the United States as a nation, and to celebrate our employees in the APJ and India regions, for their innovations and contributions to Symantec. We begin this two-part series with a look at the origin of ...
updated blog entry 28 Apr 2015
Let’s face it, many of us are guilty of giving a parent, grand parent or elderly friend a tech gadget, excited about bringing them into the “new age of tech”. However, often we quickly realize we don't have the patience, or the time, to help them learn how to use it. After all, isn’t it just intuitive? It’s easy, just play around with it and you’ll figure it out! While often seniors get a ...
updated blog entry 28 Apr 2015
Symantec’s 2015 State of Privacy report details the findings of research into the general public’s perceptions and attitudes towards protection their information. Surveying 7,000 people across Denmark, France, Germany, Italy, Netherlands, Spain and the UK in December 2014, the report explores consumer behaviour around data protection, and uncovers consumer perception on the value of data. Key ...
updated blog entry 28 Apr 2015
The Events section provides information about new product launches, analyst events and other Symantec events that are relevant to you. More Details _________________________________________________________________________________________ Upcoming Events & Symantec Webcasts May 14, 2015 Quarterly earnings conference May 17, 2015 M6 Mobility xChange Summit San Diego, ...
updated blog entry 24 Apr 2015
Today we celebrate Earth Day’s 45th anniversary by highlighting a variety of activities that demonstrate Symantec’s commitment to environmental stewardship and promoting the future sustainability of our planet. From the culmination of our One Mug, One Planet campaign, to shutting down the water feature in the Mountain View headquarters’ courtyard, to the launch of our employee sustainability ...
new event 20 Apr 2015
Visit Booth #3811 in the North Hall to experience our exciting new Cybersecurity Simulation offering. Learn more about how Symantec can protect organizations from Advanced Persistent Threats while keeping their information safe in the era of the Internet of Things. Visit our Cybersecurity Operations Center and join our Security Analysts as they identify malicious activity and walk through a ...
new event 24 Mar 2015
Veritas Technologies Corporation, the independent information management company that will emerge once the separation from Symantec is complete, is ready to preview its product strategy with select industry analysts. The Veritas business will continue to invest in its leading core products and deliver them however enterprises want to buy them, whether it’s in the cloud, on-premise ...
new event 18 Dec 2014
Symantec will be at the upcoming Mobile World Congress industry event taking place in Barcelona on 2-5 March 2015, sharing some exciting updates around Symantec’s mobile offerings. If you are interested to connect with our mobile executives and experts to discuss our latest product offerings and trends please contact Lourdes_Johnson@symantec.com or Patricia_Valuch@symantec.com in the Analyst ...
new event 01 Dec 2014
Any device, any time, any place productivity.  The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives.  To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming ...
new event 04 Nov 2014
On 9th October Symantec announced that its Board of Directors has unanimously approved a plan to separate the company into two, independent publicly traded companies: one business focused on Security and one business focused on Information Management (IM). As the industry landscape continues to change at a rapid pace, the Security and IM businesses each face unique competitive opportunities ...
new event 03 Nov 2014
Any device, any time, any place productivity. The promise of mobile comes with many challenges for organizations seeking competitive advantage through mobile initiatives. To achieve productivity with mobile, enterprises need to protect corporate data on devices, separate personal and corporate information, manage diverse operating systems, and prevent devices and apps from becoming another ...
updated event 25 Aug 2014
This year, Symantec will be in Booth 1635. Meet with our experts and discuss key market trends and updates from Symantec. See the full schedule here: http://bit.ly/1lrn09o If you are an industry analyst and interested to speak with Symantec, please contact: Chhavi_Ahuja@symantec.com or Kurt_Mumma@symantec.com in the Analyst Relations team to schedule a meeting. We look forward to seeing you ...
updated event 04 Aug 2014
Symantec leaders will be on hand to discuss market trends, issues, and provide updates on Symantec in Mobile. If you are an industry analyst and interested to meet with our experts please do connect with us by emailing Lourdes_Johnson@symantec.com to request a meeting. Symantec Sponsorships & Thought Leadership Sessions CIO Summit - September 9, 2014 1:15 – 2:15 pm: Combining Mobility ...
new event 17 Sep 2013
In a survey of 80 health care organizations in the U.S., the Ponemon Institute found that nearly three-quarters said they don’t secure their medical devices, even though they contain sensitive patient data and perform critical care functions. It has been demonstrated that hackers can tap into devices such as pacemakers and insulin pumps, the FDA warned. In addition to malicious attacks, ...
new event 25 Jun 2013
Symantec Cyber Week: La Protezione dei sistemi critici   Luca Rossi, TSO Specialist, Symantec Italia   Perchè i Server? La Protezione dei sistemi critici La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la ...
updated video 24 Jan 2014
The Omnibus Final Rule put into effect on September 23, 2013, modified HIPAA’s previous requirements and impacts the HIPAA Privacy and Security Rules. In addition to finalizing Breach Notification, Omnibus also significantly increases Civil Monetary Penalties (CMPs) and changes how they are applied. Changes to the definition of Business Associates has meant significant adjustments for many ...
updated video 23 Sep 2013
How to download, run and use SymHelp to diagnose common Symantec product issues. For additional information on running self-help reports with SymHelp please visit: How to run and use Symantec Help reports http://www.symantec.com/docs/TECH210694
updated video 16 Aug 2013
Symantec's Gigi Schumm appeared on Government Contracting Weekly where she speaks on her career background and Symantec's role in protecting the worlds people and information.  Government Contracting Weekly is sponsored by AOC Key Solutions.  To learn more, visit www.governmentcontractingweekly.com
updated video 16 Jun 2013
This four minute video describes how to register for Symantec Connect, log in, set your profile information and manage notifications.
updated idea 23 Apr 2015
Presently, it is difficult to locate a particular blog. When I click on a particular author, I am presented with a list of years for which the author has written blogs. If I click on the year, I get a list of months in this year which have blogs from the author. It is unlikely that I know the month and the year of a particular blog that I want to find. Clicking on the wrong month/year means ...
new idea 29 Dec 2014
The ability to schedule multiple implementation sub-tasks to users or groups after a change has been approved. Currently this is partially available but only once the change has started. Customer requires to add the tasks before the changed must be implemented as users are scattered globally and require notification once a change is scheduled/approved to see what tasks are assigned to them and ...
new idea 15 Dec 2014
Make the SymAccount login available across the entire Symantec.com website. If I have to navigate to several different places at Symantec.com, I have to login with the same SymAccount at all of those places. Just this morning I logged in to change email preferences because I was getting spammed by Symantec about third-party products. After that, I came to Connect. Same SymAccount, and I had to ...