Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

With mobility and the cloud dominating today's computing landscape, IT needs to examine new methods of ensuring trustworthy access, including risk-based authentication methods that strike a balance between robust security and accessibility. ...
Blog Entry by Marty Jost | 10 Dec 2012 | 0 comments
Symantec would like to announce the new update of VIP, with a new look and feel to VIP Manager and new functionality for Enterprise Gateway v9.2.  The current VIP Manager will ...
Blog Entry by Teresa Law | 06 Dec 2012 | 1 comment
Enterprise Cloud adoption continues to accelerate. It’s no longer a question whether the Cloud will gain acceptance but how quickly and broadly it will spread. The cost advantages that Software as a Service (SaaS) delivers make it widely attractive as ...
Blog Entry by Marty Jost | 02 Nov 2012 | 0 comments
The month of October has seen some of the significant product updates to Symantec VIP. Here is a summary of what’s new. VIP Third-Party Integrations Symantec VIP provides almost 25 enterprise third party application plug-ins integrating ...
Blog Entry by sambit | 29 Oct 2012 | 0 comments
Announcing Managed PKI Service v8.6 Symantec would like to announce the release of Managed PKI Service v8.6, which includes new Managed PKI clients for the Android and the ...
Blog Entry by Teresa Law | 23 Oct 2012 | 0 comments
The month of September has seen some of the significant product updates to Symantec VIP. Here is a summary of what’s new. VIP Access Desktop 2.1 for Windows Earlier this month we released VIP Access Desktop v2.1 for Windows with specific focus on ...
Blog Entry by sambit | 20 Sep 2012 | 0 comments
Purpose Since our last communication announcing the availability of Symantec Managed PKI 8.4, Symantec has been adding new features to its Managed PKI platform. With version 8.5, the product now offers a rich collection of features that truly ...
Blog Entry by Mona Salvi | 26 Jun 2012 | 2 comments
A recent BBC article has shed further light on the fact that not all online security companies or products are created equal. According to the article, hackers have found a way around some banks’ two-factor authentication security devices and have gained ...
Blog Entry by Marty Jost | 05 Apr 2012 | 1 comment
According to a recent iPass Mobile Enterprise Report , iPhones are now more popular in enterprises than Blackberry and Android phones. With the growing popularity of iPhones and iPads in the workplace, it’s important that these tools have high quality ...
Blog Entry by Marty Jost | 24 Feb 2012 | 2 comments
This past year provided many important lessons in online security and protection. Based on these lessons and because of the numerous cyberattacks and threats in 2011, many organizations and businesses are currently revamping their online security ...
Blog Entry by Marty Jost | 09 Feb 2012 | 3 comments