Video Screencast Help

Network Access Control

Results for Network Access Control

Dear All, As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization ...
Blog Entry by kishorilal1986 | 17 Feb 2013 | 1 comment
I need a solution Hi Guys! Here is my scencario We have a client that has a production SNAC only SEPM v11 as well 3 LAN enforcers and 1 Gateway enforcer.Current clients is 6000. ...
Forum Discussion by Jaredirk | 14 Feb 2013 | 2 comments
Information Technology is radically changing. We can wrap it in terms and buzzwords like cloud, mobility, BYOD, Web 3.0, but the reality is both the sum of and more complex than the names we give it. IT is no longer in the hands of the professionals. ...
Blog Entry by PaulTobia | 12 Feb 2013 | 0 comments
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 07 Feb 2013 | 0 comments
I need a solution Does the nforcer password should be the same with SEPM? Or should it be the same as the pre-shared key or encryption password? and for the config part: If ...
Forum Discussion by Jaredirk | 06 Feb 2013 | 3 comments
I need a solution   Hi, The SEPM server can ping the enforcers and I can ping the SEPM server. We had also configured on the enforcer the ip of the sepm, port and key ...
This issue has been solved
Forum Discussion by Jaredirk | 05 Feb 2013 | 3 comments
Symantec security response has posted a write-up about a new Android threat, Android.Claco (also known as SuperClean) that poses new challenges to security teams in a world of BYOD.  You can read about the threat here: ...
Blog Entry by uuallan | 05 Feb 2013 | 1 comment
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 05 Feb 2013 | 0 comments
I need a solution We have 1 LAN and Gateway enforcer which is upgraded to 12.1 RU2. I would like to know how will I connect the 2 enforcers to my SEPM and see them in the server ...
This issue has been solved
Forum Discussion by Jaredirk | 05 Feb 2013 | 6 comments
I need a solution Has anyone know where to find the management server configuration wizard in windows server 2012? I will use a remote SQL database because the server is using ...
This issue has been solved
Forum Discussion by Jaredirk | 04 Feb 2013 | 5 comments