Video Screencast Help

Search

Search results

Introduction This is number eleven in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which ...
Article by Mick2009 | 17 Nov 2015 | 1 comment
Hi , A recent vulnerability has been identified and it is SYM15-011 and all SEP 12.1.x versions are affected. To fix the vulnerability either the SEPM or the clients needed to upgraded to 12.1.6 MP3 For info regarding the vulnerability check ...
Article by RJ03 | 16 Nov 2015 | 0 comments
Note: This is based on SEPM v12.1.6 console. Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about how they are running. Then all of sudden ...
Article by Tony Sutton | 14 Sep 2015 | 0 comments
Introduction This is the eighth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it ...
Article by Mick2009 | 20 May 2015 | 8 comments
The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. ...
Article by dion_alken | 20 Feb 2015 | 0 comments
Introduction This is the fifth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it ...
Article by Mick2009 | 31 Jan 2014 | 5 comments
Introduction This is the fourth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it ...
Article by Mick2009 | 06 Jan 2014 | 10 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments