Video Screencast Help

EMEA

Results for EMEA

I need a solution Hi Guys, I need to know the ideal sequence of deploying different Symantec security products which should include below products. Symantec Protection Suite ...
This issue has been solved
Forum Discussion by Atif | 31 Oct 2012 | 5 comments
I need a solution I am looking for technical and sales presentation for following Symantec Products. Would be great if there are premade presentations available for those products. ...
This issue has been solved
Forum Discussion by Atif | 30 Oct 2012 | 3 comments
Last month, we held our annual Partner Engage conference in Baltimore – my first as the new Symantec Channel Chief – and coming away from that event I am filled with a real sense of excitement about the opportunities, insight and experiences we shared ...
Blog Entry by John Eldh | 24 Oct 2012 | 0 comments
Give Your Customers Insight into How to Optimize NetBackup Operations Introduction NetBackup customers are faced with challenges maintaining SLAs against rapidly growing data, evolving infrastructure, etc.  Trends such as virtualization, ...
Article by pvmayer | 15 Oct 2012 | 4 comments
The Best Blacklist Protection—Symantec Website Security Search engines, the heart of the internet, reserve the right to blacklist websites. Blacklisting can mean that a company does not show in search results or that a warning is ...
Blog Entry by Charla Bunton-J... | 09 Oct 2012 | 3 comments
Social media—by now almost every company knows they need to get on board in some way, but many don’t know where to start. Many have started that Facebook page or put out a few tweets only to lose momentum. Others inspire envy in their seemingly ...
Blog Entry by Christy Loerzel | 02 Oct 2012 | 0 comments
I need a solution How can I get the Cisco 6059 in Symantec SIM?  We used the Symantec Information Security Manager (SSIM 4.7.4) and configured the Cisco IOS Event Collector. But ...
This issue has been solved
Forum Discussion by allenchung | 28 Sep 2012 | 1 comment
Dear, good day. Performing some tests a few days ago based on the operation of virtual machines performed the test regarding the transfer of files from virtual machine to real machine and vice versa. Aware that when it comes to attacks on ...
Blog Entry by Fabiano.Pessoa | 22 Sep 2012 | 0 comments
  You've probably been surprised at some site with messages like "your computer is not protected" or "your computer is infected". Behind these scary messages (scare) are hiding the real threats. When you accept the ...
Blog Entry by Fabiano.Pessoa | 19 Sep 2012 | 0 comments
Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?  Would not it be nice to send this log to the administrator so that it has real science of what ...
Blog Entry by Fabiano.Pessoa | 10 Sep 2012 | 0 comments