Video Screencast Help

EMEA

Results for EMEA

Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?  Would not it be nice to send this log to the administrator so that it has real science of what ...
Blog Entry by Fabiano.Pessoa | 10 Sep 2012 | 0 comments
Good morning gentlemen  It would be great to create a failure analysis after disinfection in the operating system  It would be very good this fix in the system caused by malicious file example of an attack that metasploit using java and concept by ...
Idea by Fabiano.Pessoa | 31 Aug 2012 | 0 comments
Brazil Sat, 20 October, 2012 - 8:30 - 17:00 AMT It will be held on the 20th of October the ...
Event by Fabiano.Pessoa | 26 Aug 2012 | 0 comments
It’s been just over 5 months now since Backup Exec 2012 became generally available, and we’ve seen a lot of exciting air cover regarding this release. If you are one of the few partners who haven’t heard about it yet, in this new version we introduced a ...
Blog Entry by Susie Spencer -... | 21 Aug 2012 | 0 comments
I need a solution Hello. Im implementation SMM 7.2 in a test environment. I use implementation documentation. I use HTTP and anonymous authentication. When i connect from Mobile ...
This issue has been solved
Forum Discussion by Alexcd83 | 16 Aug 2012 | 1 comment
Bonjour, Le traitement d'un incident a fait apparaître que si un utilisateur sur un poste client géré par le serveur (SEP 4 sur SBS 2011) ne s'impose pas la démarche volontaire d'en informer l'administrateur les popups ...
Idea by Astier | 15 Aug 2012 | 0 comments
Dear, good morning. Who ever heard of sites cloned? The idea that I come to propose, it is a defense against social engineering attack. Network, we could do many things or outside, because the Internet is the "big network". The case ...
Idea by Fabiano.Pessoa | 03 Aug 2012 | 0 comments
Dear, good morning. It would help create a line of defense based on commands ROUTER, given that we could make a coordinated attack by both the equipment that support the operation such as: router, hubs, switches. With this type of attack, the board ...
Idea by Fabiano.Pessoa | 02 Aug 2012 | 0 comments
Hello Symantec Partners, Have you ever come across a situation when you need assistance but not sure whom to approach? While there are Technical Support services in place, they may not address challenges associated with Design or Assessment. Stay ...
Blog Entry by Denis Kattithara | 18 Jul 2012 | 0 comments
I need a solution Hi guys, I am looking for DLP, SEP, CCS and PGP sizing excel sheet template with macros to calculate the sizing of soluton by entering required information. I ...
This issue has been solved
Forum Discussion by Atif | 14 Jul 2012 | 4 comments