Video Screencast Help

Data Loss Prevention (Vontu)

Results for Data Loss Prevention (Vontu)

In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 07 Feb 2013 | 0 comments
I need a solution what are the different method for policy tune up? 1 ...
This issue has been solved
Forum Discussion by sharmakhilesh | 07 Feb 2013 | 3 comments
I need a solution The information I have says: To implement the two-tier installation, you install the Oracle database and the Enforce Server on the same computer. You then ...
This issue has been solved
Forum Discussion by NetUser | 06 Feb 2013 | 5 comments
I need a solution How to DLP montior/prevent confidential data on Network and Endpoint.? 1 ...
This issue has been solved
Forum Discussion by Sumit G | 06 Feb 2013 | 1 comment
I need a solution Is anyone else experiencing this issue? Why is the message wait time so high? What other information does someone need to know why it would be? Hi ...
Forum Discussion by enebdu | 06 Feb 2013 | 3 comments
I need a solution How to reduce false positive incident of network and endpoint in DLP? 1 ...
This issue has been solved
Forum Discussion by Sumit G | 06 Feb 2013 | 1 comment
I need a solution DLP SMTP Prevent policy to capture "X" violation and create a email header and forward to mailgate way. Once there mailgate way policy looks for header ...
Forum Discussion by fletchfletch | 05 Feb 2013 | 5 comments
Symantec security response has posted a write-up about a new Android threat, Android.Claco (also known as SuperClean) that poses new challenges to security teams in a world of BYOD.  You can read about the threat here: ...
Blog Entry by uuallan | 05 Feb 2013 | 1 comment
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 05 Feb 2013 | 0 comments
Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12.. When we had SAV in the market what our customer needed was just a Antivirus to protect their ...
Blog Entry by Vikram Kumar-SA... | 04 Feb 2013 | 0 comments