Video Screencast Help

Protection Engine for Network Attached Storage (formerly SAV for NAS)

Results for Protection Engine for Network Attached Storage (formerly SAV for NAS)

I need a solution hello, We have an issue, if there are 2 users uploading the file for scanning and one of them has virus then it gives and error message to both the users that the ...
Forum Discussion by proxybon | 23 Apr 2013 | 5 comments
I’m optimistic on the current trends in security. The concepts of “intelligence” and “big data” have to potential to shift focus to counter the current threat landscape of intentional attacks to steal or destroy valuable information. Additional focus on ...
Blog Entry by PaulTobia | 18 Apr 2013 | 0 comments
One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career.  One of the ways I dealt with this problem is through an effective use of the risk ...
Blog Entry by Phil Harris | 16 Apr 2013 | 0 comments
Recently, there have been a string of high profile compromises attacking both could based services, a cloud based note taking site, a fast food companies Twitter account, as well as corporations and individuals.  A well known technology writer had his ...
Blog Entry by Joseph.Rogalski | 08 Apr 2013 | 3 comments
Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install alarms, locks, buy safe cars, have automatic lights, ...
Blog Entry by Robert Shaker | 03 Apr 2013 | 2 comments
I need a solution Hi can someone help I looking for a trial version of the Symantec Scan Engine to use with Trustwave's MailMarshal SEG, I have tried looking at the download site ...
This issue has been solved
Forum Discussion by BCOT SysAdmin | 02 Apr 2013 | 16 comments
This was my second year at the RSA Conference. It was interesting to come back as a "veteran" to the largest security conference (24k attendees according to rumor). I consider myself a veteran since I didn't really see differences between ...
Blog Entry by PaulTobia | 01 Apr 2013 | 0 comments
I see sessions popping up in conferences and articles lately prophesying the demise of DLP and that DLP has run its course and is something companies should avoid. I have to ask a simple question: Why is it when attackers get more creative and cunning ...
Blog Entry by Phil Harris | 29 Mar 2013 | 5 comments
The United States is ranked #1 for malicious activity by source and we are responsible for just over 21% of all of the malicious activity.  Much of this has to do with my mother the innocent victim who doesn’t know any better and doesn’t even know there ...
Blog Entry by Joseph.Rogalski | 25 Mar 2013 | 2 comments
#1. Pre Requisites:   User must have administrator privilege on machine. User must have the required intelligent updater IU / Rapid release RR downloaded. All commands are in assumption that install directory is C . Command ...
Blog Entry by ABN | 25 Mar 2013 | 0 comments