Video Screencast Help

Search

Search results

SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of that tail. Luckily SSL's stronger sibling, TLS, ...
Article by Art_P | 08 Jan 2015 | 0 comments
Symantec's Email family of cloud services and products deliver Security, Privacy and Control over your email. Protection from malware, phishing, spam and targeted attacks is combined with BYOD, Secure Email for Smartphones & Tablets, ...
Article by GSO Customer Tr... | 22 Oct 2014 | 0 comments
Symantec Messaging Gateway software consists of the following subcomponents: Scanner Control Center Scanners do the following tasks: Process the inbound messages and outbound messages and route messages for delivery. Download ...
Article by yang_zhang | 16 Jul 2014 | 0 comments
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 07 May 2014 | 4 comments
Symantec Messaging Gateway logs let you monitor events for your Scanners, the Control Center, Directory Data Service, and Spam Quarantine. Be familiar with these log file will be great help to troubleshooting. Here is the description of the log ...
Article by yang_zhang | 06 May 2014 | 0 comments
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Hello, I wanted to share with you some thoughts and ideas about a common business use case for sending mail that brings a couple of risks that shouldn’t be forgotten as it can have a huge impact on your entire mail infrastructure. As we are all ...
Article by toby | 30 Aug 2013 | 0 comments
Context This article seeks to go over the details of configuring an AWS Virtual Private Cloud (VPC) to enable the use of centralized gateway IDS/IPS solutions in the cloud as we do today in the virualization world.  As a part of this research, ...
Article by Krishnan Narayan | 02 Jul 2013 | 3 comments
Dans la 18ème édition  de l’ISTR (Internet Security Threat Report) publiée en Avril 2013, les équipes et laboratoires de Symantec ont constaté que le taux de détection de SPAM est en baisse pour la seconde année consécutive : En 2011, 75% des ...
Article by François Baraër | 02 May 2013 | 0 comments