Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Managed Security Services

Results for Managed Security Services

I need a solution I have using the symantec endpoint protection version 11.0.6000.550 server base setup in window server 2008 R Enterprise with service pack 2. i need to block all ...
Forum Discussion by vpandit23@gmail.com | 12 Sep 2013 | 5 comments
Now, more than ever, is it important to demand that your cloud services provider provides complete transparency regarding the security and compliance measures they use and have in place to protect your companies’ sensitive information and intellectual ...
Blog Entry by phlphrrs | 27 Aug 2013 | 0 comments
By Brian Dunphy, senior director, product management, Symantec Managed Security Services In the current business climate, organizations that need to process, store or transmit credit card data are most likely familiar with the Payment Card Industry ...
Blog Entry by Symantec Corp. | 12 Aug 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
I need a solution i want to install altiris agent on win 8 .   pls help  1 ...
This issue has been solved
Forum Discussion by albertdc | 02 Jul 2013 | 1 comment
Les Managed Security Services Symantec permettent la détection des incidents de sécurité à partir des logs d’équipements, de serveurs et de postes de travail. L’efficacité de la détection d’attaques ciblées résulte de la coordination des forces du ...
Blog Entry by Evelyne Lescuyer | 14 Jun 2013 | 0 comments
With the additional functionality/integration between SSIM and GIN in 4.81, there’s an enhancement request we would like to make:   Periodically, we run into situations where we will max-out the resources of SSIM if we add large quantities of ...
Idea by Another IT Person | 10 Jun 2013 | 0 comments
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
Does your customer have a requirement for monitoring servers or for Intrusion Detection? Are they asking about Real-time File Integrity Monitoring (FIM)? Have they recently failed an IT compliance or regulatory audit?   Usually a request to ...
Blog Entry by MFox70 | 31 May 2013 | 1 comment
Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part ...
Blog Entry by Brandon Noble | 29 May 2013 | 0 comments