Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Inside Symantec Community Blog
Showing posts in English
Jen Nowell | 09 Sep 2011 | 0 comments

After my maternity leave, I found myself coming back to work just in time for the Great Earthquake in Washington, D.C. and the northern Virginia area.  Not a good omen, haha!  While everyone seemed a bit shaken, I was still enjoying the hustle and bustle of being back to work.  Clear blue skies in Washington, smelling the crisp air, hearing the noises of the city, walking on the uneven concrete in DC with the canopy of trees lining Constitution Ave it was great to be back!  I was feeling empowered to make change. While now is a challenging time in Government, it is also an exciting time.  Interestingly enough, the three meetings I had recently were different but the same – meaning, there was a common theme that bubbled to the top.  I participated in the Public CIO Roundtable, then I attended FedScoop’s 3rd annual how to reduce IT government spend, and then attended and participated in a briefing conducted by our Symantec Research Labs (SRL...

Mike Reynolds PMM | 01 Sep 2011 | 0 comments

The Symantec Education Skills Assessment Tool, offers 7 new Skills Assessments for a total of 26 assessments on Symantec products.  This free, online training needs assessment tool is used to measure either an individual’s or an entire department’s knowledge of Symantec products and to help identify the need for training .  Training helps you effectively utilize Symantec product solutions and lower support call volume.   You will receive fast, accurate results, and a justification to executive management for procuring Symantec training.

New assessments include:

  • Client Management Suite 7.1
  • Deployment Solution 7.1
  • Endpoint Protection 12.1
  • Enterprise Vault 10
  • Management Platform 7.1
  • ServiceDesk 7.1
  • Workflow 7.1

Click here to check out the new and existing Skills Assessments.

Dan Jennings | 30 Aug 2011 | 0 comments

I have posted cloud computing commentary for Finance customers at:

Having spent the last four years ingesting, disecting and putting back together, comment from my customers, colleagues at other vendors and analyst report, I have seen that there was a customer view that was not being reflected by most in the IT industry when they try to persuade decision makers that our colud offerings are worth considering.

I hope the time to read is worthwhile.

ohzone - CherylPeterson | 19 Aug 2011

As a member of the Connect Community, we value your opinion about what happens on the site. We'd like you to tell us what you think about a site enhancement we are contemplating. Are you interested in a personalized Connect homepage, where you can choose what content and options you view? Please take a few minutes and take this short survey. There is a comment box available on the survey for you to share any addition thoughts you have about this enhancement.

Click here to take survey

The Connect Team

mdjainam | 05 Aug 2011 | 0 comments


Admissibility of electronic records

Section 65B of the Indian Evidence Act relates to admissibility of electronic records as evidence in a Court of law.

The computer holding the original evidence does not need to be produced in court.

Extract from the Indian Evidence ACT:

65A. Special provisions as to evidence relating to electronic record:

The contents of electronic records may be proved in accordance with the provisions of section 65B.

65B. Admissibility of electronic records:

(1) Notwithstanding anything contained in this Act, any information contained in an electronic record which is printed on a paper, stored, recorded

or copied in optical or magnetic media produced by a computer (hereinafter referred to as the computer output) shall be deemed to be also a

document, if the conditions mentioned in this section...

JBordwine | 03 Aug 2011 | 0 comments

One of the benefits to bringing together nearly all of the public sector’s top influencers at the Symantec Government Symposium each year is the opportunity to take a unified snapshot of the federal IT security landscape, and to gauge precisely how perceptions (and realities) have shifted over the past 12 months.

As it happened, this year’s snapshot focused mainly on the security implications of mobile computing and the proliferation of mobile devices in the Federal Government. We polled 195 top IT decision makers (75% Federal, 13% DoD/Intel, 12% SI), and here’s some of what we learned:

  • 75% of Federal IT professionals with responsibility for mobile security say the adoption of mobile devices has increased their security risks.
  • Only 47% of Feds say their organizations adequately manage the mobile devices they use for work purposes.
  • Only 8% of agencies have Mobile Device...
tiffany_jones | 20 Jul 2011 | 1 comment

Tiffany Jones, director, Public Sector Programs and Strategy

As one might expect, details are scarce in the declassified version of the DoD’s first-ever cyberspace guidelines (released last Thursday). But from a 30,000 foot perspective, the policy looks sounds.

Consider the five key tenets (or “strategic initiatives”) contained in the directive:

1: Treat cyberspace as a domain for training and equipping defense forces

2: Employ new defense operating concepts

3: Create strong partnerships between agencies and with the private sector

4: Build relationships with foreign allies

5: Leverage U.S. innovation

These are worthy goals, to be sure (in particular, the overarching themes of operational preparedness and information sharing). Even without the details, it’s heartening to see fundamentally sound priorities for a DoD infrastructure that houses—quite possibly—more sensitive information...

deepak.vasudevan | 12 Jul 2011 | 0 comments

A picture is said to be worth one thousand words. More better than a picture if we can illustrate what we are doing in our system by an interactive video so that it can help make our presentation more lively. A whilst back we had an excellent piece of video tutorial by Kimberley on preparing a video screencast using Screenflow tool. You can access the article over here. However, Screenflow tool is not a free software and hence if you do not have it then you are out of luck.

I recently came across another similar tool called 'BB FlashBack' which also offers a free express edition helping to record our screen presentations as videos. It also does support audio recording through your computer microphone. Some of the salient features of this tool are:

  1. Options of either a free version of...
Ned Miller | 30 Jun 2011 | 0 comments

I had the opportunity and good fortune to moderate a panel at the 2011 Symantec Government Symposium on the topic of “Continuous Monitoring… What’s Next?” The panel members included spokespersons from NSA and NIST and the CISO’s from IRS and HHS. We agreed prior to the session that the goal of the panel was to communicate to our audience of approximately 100 or so attendees what our real world experiences were in designing and deploying technologies to achieve a state of continuous monitoring. It was all going according to plan until the moment we engaged the audience and started fielding questions.

In the spirit of interacting with today’s younger Internet savvy (a.k.a. teenagers) we polled the room and learned that, out of the 100 or so people in attendance, “continuous monitoring” had a different meaning to different organizations. It was very clear we have a long way to go to deliver on the promise of continuous monitoring...

Rich Lam | 19 Jun 2011 | 1 comment

About a week ago, we added new interactivity to the third banner on the GeoTrust homepage (Now part of Symantec). Upon clicking on the projector graphic, visitors are presented with a modal overlay featuring an embedded video on how more Alexa top 1 million domains are using GeoTrust. It's an infotaining and engaging video. Enjoy!