Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hello, This Document provides an Insight to Functionality by below Product and its Features. Norton™ Internet Security 2011, Symantec™ Endpoint Protection Small Business Edition 12.1, Symantec™ Endpoint Protection.cloud ...
Download by Mithun Sanghavi | 29 Aug 2012 | 2 comments
Hello, Here is a WhitePaper on Symantec™ Endpoint Protection Small Business Edition Comparison Chart Comparing the Symantec Endpoint Protection Small Business Edition v12.0 and Symantec Endpoint Protection Small Business Edition v12.1. This ...
Download by Mithun Sanghavi | 24 Aug 2012 | 3 comments
Here is a Comparison between Windows Vista Firewall and Symantec Endpoint Protection Firewall. This document gives you information on why we should use SEP firewall rather than Windows Firewall. Windows Vista and Windows 2008 share the same ...
Download by Vikram Kumar-SA... | 28 Feb 2012 | 8 comments
Hi All,   In security industry, any security analyst will always require to scan the network for available network shares. Though there are many such tools available for the same, i am going to share this very simple tool which i found really ...
Download by Avkash K | 22 Feb 2012 | 1 comment
  Hi, We do encourage people to use SEP Small Business Edition 12.1 instead of Small Business Edition 12.0 However if you are using 12.0 this download might help you.    SBE 12.0 Product life cycle details   ...
Download by Chetan Savade | 02 Dec 2011 | 3 comments
Hello, W32.Sality is a file infector that spreads by infecting executable files and by replicating itself across network shares. Infected hosts join a peerto-peer network used to propagate malware on the compromised computer. Typically, those ...
Download by Mithun Sanghavi | 07 Oct 2011 | 1 comment
Hello, W32.Xpaj.B is one of the most complex and sophisticated file infectors Symantec has encountered. Given this level of complexity, it was decided to conduct a deep analysis of this threat. The analysis revealed IP addresses for the command ...
Download by Mithun Sanghavi | 07 Oct 2011 | 0 comments
Hello, Symantec Intelligence Report: September 2011 A MUST READ for all Security Professionals   Social Engineering Attacks Soar as Polymorphic Malware Rate Peaks at 72% of Email Malware in September; Cyber Criminals Ambush Popular ...
Download by Mithun Sanghavi | 07 Oct 2011 | 1 comment