Video Screencast Help

Search

Search results

Hi All, Is there any options in SEPM console where we can upload or reload sepm logs in external syslog server for a perticular time periond. lets say if due to some network problem my sepm logged missed for a week period then I can select that ...
Idea by Sushil B | 15 Jul 2015 | 0 comments
標的型攻撃は、現代のセキュリティインフラストラクチャが直面している、特に厄介で難しい脅威です。シマンテックは、2013 年に標的型攻撃の件数が 91% も増加したことを確認しています。ここでは、標的型攻撃の詳細と、すぐに実行できる対策についてお伝えします。 ...
Blog Entry by Solange Deschatres | 02 Jun 2015 | 0 comments
The clock is ticking... This is part two of a three part series discussing the end-of-life (EOL) of Windows Server 2003. As mentioned in  part one , on July 14th, 2015 Microsoft ...
Blog Entry by Digital_Kru | 09 Mar 2015 | 0 comments
The Surprising Scope of Mobile Malware Growth Around The World Mobile workforces and BYOD have brought smartphone ...
Blog Entry by Solange Deschatres | 12 Jun 2014 | 0 comments
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
I guess we need to face it. Sality is here to stay. We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors ...
Blog Entry by Brandon Noble | 30 Dec 2013 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by V4 | 03 Dec 2013 | 0 comments
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part ...
Blog Entry by Brandon Noble | 29 May 2013 | 0 comments