Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

    ITS Coffee Talks: Credit Card Breaches and Symantec Security Solutions  Season 1, Episode 1   |  Copyright ITS Partners, LLC 2014 Host: Jacob Crawford ...
Video by jcrawford2009 | 19 May 2014 | 0 comments
I need a solution We installed one of the solution packs that included a policy called "Network Security".  There are predefined rules for hacker tools, keyloggers, and ...
This issue has been solved
Forum Discussion by RonCaplinger | 17 Dec 2013 | 3 comments
1 Introduction Smartphones have been widely adopted by organisations for day to day business and operational use, and employees can often access their work related data by connecting to corporate networks using their Smartphones. Many ...
Article by Vikas Rajole | 21 Mar 2013 | 12 comments
Webcast Thu, 14 June, 2012 - 10:00 - 11:00 PDT According to the latest “Cost of a Data Breach ...
Event by Swathi Turlapaty | 08 Jun 2012 | 0 comments
  USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.  For each USB device, extended information is displayed: Device name/description, device ...
Download by Aniket Amdekar | 24 May 2012 | 9 comments
Symantec needs your help and feedback in evaluating our SPCv2 beta.  I know you’ve seen presos on Symantec Protection Center (SPC) v2 and many of y'all are already evaluating the SEP 12.1 beta...  you can “kill two birds” by evaluating SPCv2 along ...
Idea by SecuredThatToo | 09 May 2011 | 0 comments
Introduction Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports ...
Article by Farzad | 20 Sep 2010 | 1 comment
This month Microsoft released an update for Windows to address three vulnerabilities in the SMB Server component. Two of the vulnerabilities are remote denial-of-service (DoS) attacks, while one (CVE-2010-2550) has the potential for remote code ...
Article by Aniket Amdekar | 10 Aug 2010 | 0 comments
Hilton Baltimore Sun, 06 June, 2010 - 2:00 PDT - Mon, 14 June, 2010 - 9:30 PDT Dear Colleague, ...
Event by gambrose@sans.org | 11 May 2010 | 0 comments