Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 0 comments
This article will demonstrate the upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version. Download the latest software from here: https://symantec.flexnetoperations.com/control/symc/registeranonymouslicensetoken . Product Serial ...
Article by Chetan Savade | 28 May 2014 | 3 comments
Hello Everyone, This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This whitepaper does not cover deploying Symantec ...
Article by Chetan Savade | 22 May 2014 | 0 comments
Brief Description about Symhelp: Symantec Help (SymHelp) is a diagnostic utility designed for Symantec Endpoint Protection used in identifying common issues and providing quick solutions to common problems. SymHelp - with a run time around three ...
Article by Chetan Savade | 21 May 2014 | 3 comments
Overview:  While you may not realize it, any  .dat   policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from  .dat  to  .zip , you gain access to the actual input ...
Article by jcrawford2009 | 30 Apr 2014 | 0 comments
Overview: When it comes to creating and configuring administrator-defined scans in the Symantec Endpoint Protection Manager, sometimes there isn't quite enough granularity. For example, let's say that all the clients addressed by your ...
Article by jcrawford2009 | 28 Apr 2014 | 6 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 03 Mar 2014 | 4 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments