Video Screencast Help

Symantec Vision

Results for Symantec Vision

In these days of security threat explosion, it’s not just the number of emerging new threats that is worrisome but also the new ways in which we are being attacked. From brute force to vulnerability exploitation and advanced persistent threats, there are ...
Article by LeslieMiller | 18 May 2012 | 0 comments
Everyone is looking to get more, trying to make 1+1=3. When it comes to security, one of the only real ways to make this happen is to combine local enforcement with global threat visibility. By doing this, your security infrastructure can know about ...
Article by LeslieMiller | 18 May 2012 | 0 comments
Defending your enterprise from cyber threats has never been so challenging. The rise of sophisticated attacks that target specific information assets within an enterprise poses a new risk that can be difficult to identity until it is too late. From ...
Article by LeslieMiller | 18 May 2012 | 0 comments
Executive attention to IT security and risk is increasing. 70 percent of organizations report increased executive awareness due to high-profile attacks and breaches. Are you able to provide a meaningful executive view of IT security and risk? In this ...
Article by LeslieMiller | 18 May 2012 | 0 comments
In this technically focused session you will learn how one powerful solution, Symantec Scan Engine, can help you strengthen your security posture in multiple, critical areas by: - Integrating directly with NAS devices to stop malware from propagating ...
Article by LeslieMiller | 18 May 2012 | 0 comments
Symantec’s Messaging Security solutions provide some of the best spam protection in the world. As good as it is, every customer has a different definition of spam and the trade-off between effectiveness and accuracy. In this this session, you will learn ...
Article by LeslieMiller | 18 May 2012 | 0 comments
Malware continues to become more complex, and it seems like every news report announces that another company was hacked. While no single solution can stop all threats, a great place to provide protection is at the edge of the network using a secure Web ...
Article by LeslieMiller | 18 May 2012 | 0 comments
Some people consider digital certificates and the Public Key Infrastructure (PKI) that manages them complex technologies that never took off. In reality, digital certificates can be easy to use and have seen steady adoption, though often under the radar. ...
Article by LeslieMiller | 18 May 2012 | 0 comments
This session will provide an overview of Symantec’s future vision of encryption. Today, you have full disk encryption, but how will you protect your data in a virtual and cloud-based world? We will discuss both the short- and long-term encryption product ...
Article by LeslieMiller | 18 May 2012 | 0 comments
You've been thinking about initiating a data loss prevention project, but like many organizations your security group is resource constrained and you're concerned about the implementation requirements. Many organizations have solved this ...
Article by LeslieMiller | 18 May 2012 | 0 comments