Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
updated blog entry 25 Nov 2014
  지능적인 악성 코드 중 하나인 레긴(Regin)은 적어도 2008년부터 전 세계의 다양한 표적을 대상으로 한 조직적인 스파이 작전에 활용되어 왔습니다. 백도어 유형의 트로이 목마인 레긴은 매우 높은 수준의 기술 전문성을 갖춘 복잡한 악성 코드입니다. 레긴은 광범위한 기능을 활용하여 표적에 따라 맞춤 구현할 수 있으며, 관련 제어 권한을 가진 사용자에게 대규모 정탐을 가능케 하는 강력한 프레임워크를 제공하므로 정부 기관, 기간산업 기관, 기업, 연구 기관, 개인 사용자를 대상으로 한 스파이 작전에 이용되어 왔습니다. 레긴을 개발하는 데 수개월에서 많게는 수년이 소요되었을 것으로 보이며 개발자들이 관련 행적을 감추기 위해 많은 노력을 기울였을 것으로 추측됩니다. 레긴의 기능과 그를 ...
discussion comment 25 Nov 2014
discussion comment 25 Nov 2014
Rafeeq commented on: VM in SEPM
discussion comment 25 Nov 2014
discussion comment 25 Nov 2014
Rafeeq commented on: VM in SEPM
discussion comment 25 Nov 2014
new discussion 25 Nov 2014
Hello Guys . I have one laptop running windows 7- 64 BIT . Whenever I install the PGP Agent on it the installation completes and machine reboots but it goes into system recovery  prior to performing the enrollment and fails to log into the windows  
updated article 19 Nov 2014
Hello All, Follow the below steps and you are ready to scan for Heartbleed vulnerability: 1. In the CCSVM Console Web interface, click Administration from the top menu. Under the Scan Options Section on the administration page, click the manage link for Templates.     2. Find the scan template named “Full audit” and select the Copy scan template icon at the ...
updated blog entry 25 Nov 2014
  지능적인 악성 코드 중 하나인 레긴(Regin)은 적어도 2008년부터 전 세계의 다양한 표적을 대상으로 한 조직적인 스파이 작전에 활용되어 왔습니다. 백도어 유형의 트로이 목마인 레긴은 매우 높은 수준의 기술 전문성을 갖춘 복잡한 악성 코드입니다. 레긴은 광범위한 기능을 활용하여 표적에 따라 맞춤 구현할 수 있으며, 관련 제어 권한을 가진 사용자에게 대규모 정탐을 가능케 하는 강력한 프레임워크를 제공하므로 정부 기관, 기간산업 기관, 기업, 연구 기관, 개인 사용자를 대상으로 한 스파이 작전에 이용되어 왔습니다. 레긴을 개발하는 데 수개월에서 많게는 수년이 소요되었을 것으로 보이며 개발자들이 관련 행적을 감추기 위해 많은 노력을 기울였을 것으로 추측됩니다. 레긴의 기능과 그를 ...
updated blog entry 25 Nov 2014
You need to stay competitive and allowing users to work anywhere, anytime is one of the ways your business keeps its edge.  However, in some cases this means using personal devices to access data in unsanctioned cloud applications.  In IT’s opinion this is risky behavior and something they are not comfortable with.  Your users don’t engage in this behavior out of any malicious ...
updated blog entry 25 Nov 2014
El pasado Octubre, fue el mes de la concienciación nacional sobre ciberseguridad en los Estados Unidos. En la actualidad, existe una enorme cantidad de aplicaciones móviles gratuitas en el mercado, pero muchas veces hay “cargos ocultos” en estas y algunas buscan  obtener algo a cambio.  Las aplicaciones móviles han transformado la forma en que interactuamos con nuestros ...
updated blog entry 25 Nov 2014
  Thanks to George Orwell’s classic book 1984, I graduated High School thinking I would eventually live in a world monitored and suppressed by world governments.  In the wake of the PRISM scandal in 2013 I started to get the feeling that Orwell’s dystopian novel was looking like an ill-timed prophesy.  In light of comedian Pete Holms’ rant on how Privacy is Uncool, it is little ...
updated blog entry 25 Nov 2014
Tanto algunas importantes empresas como el Departamento de Defensa de los Estados Unidos han sido víctimas de fugas de datos que se produjeron como consecuencia de los ataques dirigidos a empleados o a proveedores. Desafortunadamente, además de dejar expuestas millones de identidades, estos ataques también revelan lo que suele ser el eslabón más débil de la seguridad de datos empresariales: el ...
updated blog entry 25 Nov 2014
Aconteceu com grandes corporações, até mesmo com o Departamento de Defesa dos Estados Unidos: tornar-se vítima de violações de dados resultantes de ações de invasores que exploram os funcionários ou fornecedores da empresa. Infelizmente, além de expor milhões de identidades, esses ataques também revelam o que é normalmente o elo mais fraco na segurança de dados empresariais: o elemento ...
new blog entry 25 Nov 2014
Outubro foi o mês de Conscientização Nacional da Segurança Cibernética (National Cyber Security Awareness). Existem milhões de apps gratuitos para dispositivos móveis no mercado, mas a maioria deles inclui um "preço oculto" que não é divulgado. Alguns apps gratuitos procuram algo em troca. Os apps para dispositivos móveis transformaram a forma como interagimos com nossos smartphones e ...
new blog entry 25 Nov 2014
Small-scale mobile app software entrepreneurship has been described as the cottage industry of the 21st century. It allows talented software developers to apply their skills to create new and innovative mobile apps, with the hope of becoming the next big thing and, perhaps, even attaining the trappings of wealth associated with success. However, with over 1 million apps available for download ...
updated blog entry 25 Nov 2014
Security analysts called 2013 the year of the mega breach, and severe vulnerabilities such as Heartbleed and Shellshock in 2014 showed that the security community can never rest on its laurels. All indications are that 2015 will bring more of the same, with the struggle between those wishing to create new threats and exploit vulnerabilities and those looking to protect against them likely to ...
new blog entry 24 Nov 2014
As the holiday shopping season descends upon retailers and shoppers, storm clouds of apprehension from recent data breaches continue to darken the perception of safety among some consumers. A recent study conducted by CreditCards.com and reported on by Huffington Post found that 45% of gift-grabbing respondents would “definitely not” or “probably not” shop at major retailers that suffered data ...
updated event 24 Nov 2014
Greetings Valued DLP Customers and Partners,   We respectfully request your participation at our upcoming Symantec DLP Feature Advisory Board (FAB).  We will be discussing the upcoming feature, Discover for Box Cloud Storage.  You will be among the first to see and hear about this new feature.  The meeting will be led by DLP Product Management and your feedback will shape ...
updated event 24 Nov 2014
Greetings Valued DLP Customers and Partners,   We respectfully request your participation at our upcoming Symantec DLP Feature Advisory Board (FAB).  We will be discussing the upcoming feature, Discover for Box Cloud Storage.  You will be among the first to see and hear about this new feature.  The meeting will be led by DLP Product Management and your feedback will shape ...
updated event 24 Nov 2014
Join Symantec at the Gartner Data Center, Infrastructure & Operations Management Conference 2014 in Las Vegas and get the information you need to deliver crucial IT services and drive improved levels of productivity and innovation at the same time. With a renewed focus on people, processes, technology and culture, you will learn how to select and prioritize I&O initiatives, manage ongoing ...
new event 13 Nov 2014
Presented by: Kevin Haley, Director, Security Technology And Response Webcast Summary: The true personal computer is in our pockets or purses today.  It’s the smart phone.  It is a computer with more processing power than in the first space capsule that sent men to the moon.  And it’s a very personal device - to work, play and share with our friends.  But like any ...
updated event 07 Nov 2014
Today, Healthcare organizations are at a crossroad.  Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game?  The reality is that personal health information is worth more than credit cards and what's worse is that thieves know it!   Today’s threats are also more automated, more ...
updated event 05 Nov 2014
On Cyber Monday, your organization’s employees will return from the Thanksgiving weekend, ready to kick off the online holiday shopping season – from their desks and devices.  Last year over 500+ million identities were exposed via breaches. And with malware and phishing also in the news, join us to find out how you can protect not only your business but your employees’ personal ...
new event 20 Oct 2014
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 20 Oct 2014
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
updated video 14 Nov 2014
Regardless of the size of the organization, if you handle Personal Health Information (PHI) you have to follow the rules of HIPAA. This can be a daunting exercise of weeding through the various technology solutions and aligning processes and procedures. Now you have to expand this exercise to your Business Associates. How exhausting. At Novacoast we understand that a one-size-fits-all solution ...
updated video 14 Nov 2014
The application monitoring feature in Symantec Data Loss Prevention enables you to monitor CD and DVD burning, instant messaging, email, and HTTP and HTTPS applications that can potentially leak sensitive information. This video explains how to add Chrome to the Application Monitoring screen, and provides settings that can help optimize monitoring performance.
updated video 14 Nov 2014
During this overview I will be discussing agent health features new in Symantec Data Loss Prevention version 12.5.
updated video 03 Nov 2014
Traditional IT Security & Access Management is based on a static definition of who the user is. But business is changing. The office is the home office, the coffee shop or the client site. The workstation is the computer, the laptop, the tablet or the smartphone. Users need different rights to perform different tasks, and different rights based on where they are and what device they’re ...
video comment 27 Oct 2014
updated video 14 Oct 2014
This video will demonstrate you how to install Symantec Control Compliance Suite Vulnerability Manager on Kali Linux.
updated video 30 Sep 2014
ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information about your data. Data Insight solves the problem of identifying data owners through usage patterns and behavioral tracking. Join us as we delve into the Data Insight console and demonstrate some of ...
updated idea 25 Nov 2014
I have a problem where software vendors are disabling Symatec EPP when diagnosing an issue on a clients server.  I am an IT Contractor who supports approx 30 companies The scenario, a law firm A Software vendor has one of the law firm staff log onto the server to initiate a Team viewer session. The software vendor is frequently disabling the Firewall Component of SEPP, or ...
new idea 25 Nov 2014
We are considering the implementation of the Symantec E-Mail Submission Client in our Exchange Server 2010 SP3 environment, but I see that SESC does not support Exchange Server 2013.  We will probably migrate to Exchange Server 2013 and I would hate to provide employees a more efficient way of submitting spam samples, only to have to retract that functionality at our next upgrade. Will ...
new idea 23 Nov 2014
If SONAR is doing any action like applications or queries to timeout and fail or tempering, there should be notification to avoid any disaster.    
updated idea 20 Nov 2014
Daily Active scans (quick scans) have not been detecting Master Boot Record (MBR) infections.  Nowadsys we are only finding out about MBR infections at the weekly full scan. Seems that it would not add much time to an Active scan to also scan the critical MBR.  Benefits of Active scan checking the MBR: 1. so we catch them sooner (not waiting for a weekly full scan) 2. we ...
new idea 20 Nov 2014
Please see: https://www-secure.symantec.com/connect/forums/hide-not-show-symantec-endpoint-protection-scheduled-scan-dialog In summary, I would an option permanantly to hide the dialog that shows up prior to Endpoint Protection running a scan on my managed endpoint. Instead, just run the scan without bothering my workflow with this dialog. Since it's a managed instance of Endpoint ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1513
16
AravindKM
293
1
Mithun Sanghavi
1227
59
P_K_
1131
28
SMLatCST
362
1
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.