Video Screencast Help

Data Loss Prevention (Vontu)

Results for Data Loss Prevention (Vontu)

Cube Process Scheduling Recommendations IT Analytics for Symantec Data Loss Prevention 3.0 extracts data from the Oracle DLP Enforce database(s) on a scheduled basis. The extracted data is then stored in multi-dimentional cubes within the Microsoft ...
Article by dprager | 23 Sep 2013 | 1 comment
I need a solution Hi SYmantec support, Good morning to all !!!!!! Is there any policy in DLP from which we can block uploading PDF file on web. Thanks in advance. ...
This issue has been solved
Forum Discussion by dst_admin | 22 Sep 2013 | 4 comments
Suggestion is to allow to send reports based on custom attributes value lookups. It's very important for the cases where correct data owner or file owner cannot be ascertained. Cheers. (Security, Data Loss Prevention (Vontu), ...
Idea by asutariya | 20 Sep 2013 | 0 comments
Suggestion is to have a page that shows loads on discover servers. This is important to do capacity planning for discover. Metrics should ideally show what scans are expensive and what servers are heavily used ? Your nearest competition has ...
Idea by asutariya | 20 Sep 2013 | 1 comment
I need a solution hi, i am using application that can transfer data PC to PC. i dont know why it does not take effect the policy i gave for this. please help and why i test ...
Forum Discussion by m@ntec | 19 Sep 2013 | 6 comments
Current users of IT Analytics for Symantec Data Loss Prevention 2.0 can now upgrade their installation to the new 3.0 version recently released by Symantec and gain  significant ...
Video by dprager | 19 Sep 2013 | 0 comments
I need a solution I have a customer who has changed the hostname in the .bat file run with the Endpoint agent .msi installer. It was pushed out overnight and wants to know how to verify ...
This issue has been solved
Forum Discussion by GeorgeFlint | 19 Sep 2013 | 2 comments
I need a solution Hi All, kindly advise on this. To test sender/recipient pattern with no access in internet? sample scenario: 1. users with agent install has no access in ...
Forum Discussion by m@ntec | 19 Sep 2013 | 7 comments
Large organizations generally require group based policy. As profiled DGM is two tiered detection, they need to work with synchronized DGM to have the ability of blocking on endpoints. Generally Organizations do not have groups on Windows 2008 Active ...
Idea by Tariq Naik | 18 Sep 2013 | 0 comments
<p>Use this forum to initiate general discussion regarding Business Continuity. For product-specific discussions, please visit the individual <a ...
IT Trend by LeslieMiller | 18 Sep 2013 | 0 comments