Video Screencast Help
Endpoint Security Blog
Showing posts tagged with Critical System Protection
Showing posts in English
Neelum | 01 May 2013 | 0 comments

 

According to the 2013 Verizon Breach Report data breaches affect organizations of all sizes, across all sectors with 92 percent of them attributable to outsiders and 14 percent committed by insiders.  What are your top security concerns? We want to hear from you! Answer 7 questions and receive a personalized scorecard with recommended next steps: https://scm.symantec.com/critical-system-protection-survey/en/

Look forward to your responses. 

Thanks for reading!
Neelum 

Neelum | 29 Mar 2013 | 0 comments

 

The latest release of Symantec Critical System Protection, 5.2.9 MP2, includes expanded platform support and ease-of-use enhancements to further simplify intrusion prevention. 

Expanded platform support: In 5.2.9 MP2, Symantec Critical System Protection extends support to Oracle Linux 5.8, 5.9 and 6.3 64 bit with Unbreakable Enterprise Kernel Release 2. This release also adds platform support for RedHat Enterprise Linux 6.4 64 bit. For more information on specific platforms, versions and the features they support, see Symantec Critical System Protection Platform and Feature Matrix.

Ease-of-use enhancements: The console has been updated to allow users to select multiple prevention custom policies and apply them to a group, further simplifying policy management and intrusion prevention.

For more information...

Neelum | 10 Jan 2013 | 0 comments

Why is server security different from other endpoint security? If you’re considering a solution to protect one or all of the endpoints in your environment, it's important to understand the security requirements for laptops and desktops, how they differ from servers, and why servers have greater needs for security and compliance. 

Symantec partnered with eWeek to create Security Differentiators for Servers, Laptops: 10 Best Practices. Read about the best practices here: http://www.eweek.com/security/slideshows/security-differentiators-for-servers-laptops-10-best-practices/

Thanks for reading!

-Neelum