Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

Introduction This is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 26 Feb 2015 | 1 comment
The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. ...
Article by dion_alken | 20 Feb 2015 | 0 comments
Note: This is based on SEPM v12.1.5 console. Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about how they are running. Then all of sudden ...
Article by Tony Sutton | 28 Jan 2015 | 0 comments
This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by Brɨan | 03 Jan 2015 | 4 comments
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 07 May 2014 | 5 comments
Introduction This is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 31 Jan 2014 | 2 comments
Introduction This is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 06 Jan 2014 | 8 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments