Video Screencast Help

Search

Search results

I need a solution We are developing Entrerprice Security application(Developled using .Net. Windows Application) for authentication purpose. Recently Symantec Endpoint protection ...
Forum Discussion by VULVAJI | 08 Jan 2016 | 5 comments
If you use Symantec’s DeepSight Intelligence you already have the security intel you need. Now there is a way to understand the identified vulnerabilities and the assets they ...
Video by lisawilberding | 28 Dec 2015 | 0 comments
I need a solution Hello , is it neccesary to have MD5 of file and file path in fingerprint file used in blacklist mode like : 0bb018fad1b244b6020a40d7c4eb58b7 ...
This issue has been solved
Forum Discussion by Adriatikb | 30 Oct 2015 | 2 comments
I need a solution Hello, We have a plan to upgrade our old PC farm to Windows 7. Our testing machine has installed Windows 7 SP1 (32-bit) and also installed Symantec Endpoint ...
Forum Discussion by loftthehk | 19 Oct 2015 | 4 comments
The SONAR technology within SEP 12 RU6 currently does not detect when an application captures a screenshot without user interaction according to Symantec Technical Support.  The benefit of this would be stopping screen scraping malware that takes a ...
Idea by Steve26134 | 01 Oct 2015 | 0 comments
This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
Dear All,  please find attached a (novel) idea in the rough about the evolution of endpoint protection. Your comments, especially on how to improve this paradigm, are welcome. Best, K. Distributed Secure Network Services ...
Idea by secprac313 | 20 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
I need a solution We have been a customer for quite some time, but We appear to be severly limited with the capabilities of this product when it comes to securing a modern enterprise ...
Forum Discussion by houstonR | 14 Sep 2015 | 1 comment
Implement validation of DANE/TLSA resource records for DNSSEC enabled sites and configurable actions in case of failed validation (in case a TLSA resource record has been found but does not match the certificate) Reference: ...
Idea by thomas.bandion@... | 09 Jul 2015 | 0 comments