Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Enterprise Security Manager

Results for Enterprise Security Manager

In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 07 Feb 2013 | 0 comments
Symantec security response has posted a write-up about a new Android threat, Android.Claco (also known as SuperClean) that poses new challenges to security teams in a world of BYOD.  You can read about the threat here: ...
Blog Entry by uuallan | 05 Feb 2013 | 1 comment
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 05 Feb 2013 | 0 comments
To create a SERT disc you have to logon to Symantec, give a key, download an iso, burn it to a disc, and add definitions or allow SERT to download them ( I have never been able to get the iso to see whether the program can update its own ...
Idea by bsmoltz | 01 Feb 2013 | 4 comments
InfoWorld recently ran an interesting article discussing 5 signs that indicate you might be the victim of an Advanced Persistent Threat ( ...
Blog Entry by franklin-witter | 01 Feb 2013 | 1 comment
I need a solution How can I install ESM CLI with out installing entire ESM manager ? I tried installing ESM console only but it doesn't have ESM CLI . check the install ...
Forum Discussion by crazyesm | 24 Jan 2013 | 5 comments
There's a growing buzz in the industry about "who" should be responsible for encryption in the cloud from a user perspective.  As usual, the technology to do this is not the hard part – crypto is crypto is crypto, etc.  It's really ...
Blog Entry by Phil Harris | 21 Jan 2013 | 1 comment
It is time for HIMSS' Annual Conference and Exhibition again.  This year in New Orleans, March 3 - 7.  And as that giddy excitement starts to build, it reminds me of nothing more than Senior Prom. Remember Senior Prom - - maybe you are closer to ...
Blog Entry by David Finn | 07 Jan 2013 | 0 comments
I would like Symantec to add a new option into their enterprise end point client product on malware detection.  I would like to collect the file attributes (date create, date access, data modified, and file owner name as examples on NTFS formatted ...
Idea by bhopps | 07 Dec 2012 | 0 comments
I. BACKGROUND: In mid-2009, W32.Changeup , was first discovered on systems around the world. Over the last few years, Symantec Security Response has profiled this threat , explained why it spreads , and shown how it was created .  ...
Blog Entry by Brandon Noble | 30 Nov 2012 | 15 comments