Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
The Surprising Scope of Mobile Malware Growth Around The World Mobile workforces and BYOD have brought smartphone security to the forefront for enterprises and consumers alike. Due to ...
Blog Entry by Solange Deschatres | 12 Jun 2014 | 0 comments
In our case with 20 sites that requires SEPM in each site to Update SEP clients to new version of SEP clients. I do not wish to push over the WAN to all clients from SEPM (bandwidth limitation). I do not have SEPM on each site, this would be an ...
Idea by ashvarts | 14 May 2014 | 0 comments
You guys really need to improve the following in SEP related to GUP managemnt / features: Ability to mass-upload GUPs via host name / IP address via a TXT / CSV file. Ability to Report on GUPs, there is not even basic reporting in SEPM ...
Idea by BigDogRockies | 02 May 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments
The file EXE4JLIB.JAR is identified as the Trojan Program that is used for stealing bank information and users passwords. I found this file in the folder C:\Users\Me\AppData\Local\Temp\e4jA968.tmp_dir24823. I am not able to delete this file. We are using ...
Idea by katpagan | 07 Sep 2013 | 2 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments