Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrade.
Please accept our apologies in advance for any inconvenience this might cause.

Inside Symantec Community Blog

Showing posts in English
mdjainam | 05 Aug 2011 | 0 comments


Admissibility of electronic records

Section 65B of the Indian Evidence Act relates to admissibility of electronic records as evidence in a Court of law.

The computer holding the original evidence does not need to be produced in court.

Extract from the Indian Evidence ACT:


65A. Special provisions as to evidence relating to electronic record:


The contents of electronic records may be proved in accordance with the provisions of section 65B.


65B. Admissibility of electronic records:


(1) Notwithstanding anything contained in this Act, any information contained in an electronic record which is printed on a paper, stored, recorded

or copied in optical or magnetic media produced by a computer (hereinafter referred to as the computer output) shall be deemed to be also a


JBordwine | 03 Aug 2011 | 0 comments

One of the benefits to bringing together nearly all of the public sector’s top influencers at the Symantec Government Symposium each year is the opportunity to take a unified snapshot of the federal IT security landscape, and to gauge precisely how perceptions (and realities) have shifted over the past 12 months.

As it happened, this year’s snapshot focused mainly on the security implications of mobile computing and the proliferation of mobile devices in the Federal Government. We polled 195 top IT decision makers (75% Federal, 13% DoD/Intel, 12% SI), and here’s some of what we learned:

  • 75% of Federal IT professionals with responsibility for mobile security say the adoption of mobile devices has increased their security risks.
  • Only 47% of Feds say their organizations adequately manage the mobile devices they use for work purposes.
  • Only 8% of agencies have Mobile Device...
tiffany_jones | 20 Jul 2011 | 1 comment

Tiffany Jones, director, Public Sector Programs and Strategy

As one might expect, details are scarce in the declassified version of the DoD’s first-ever cyberspace guidelines (released last Thursday). But from a 30,000 foot perspective, the policy looks sounds.

Consider the five key tenets (or “strategic initiatives”) contained in the directive:

1: Treat cyberspace as a domain for training and equipping defense forces

2: Employ new defense operating concepts

3: Create strong partnerships between agencies and with the private sector

4: Build relationships with foreign allies

5: Leverage U.S. innovation

These are worthy goals, to be sure (in particular, the overarching themes of operational preparedness and information sharing). Even without the details, it’s heartening to see fundamentally sound priorities for a DoD infrastructure that houses—quite possibly—more sensitive information...

deepak.vasudevan | 12 Jul 2011 | 0 comments

A picture is said to be worth one thousand words. More better than a picture if we can illustrate what we are doing in our system by an interactive video so that it can help make our presentation more lively. A whilst back we had an excellent piece of video tutorial by Kimberley on preparing a video screencast using Screenflow tool. You can access the article over here. However, Screenflow tool is not a free software and hence if you do not have it then you are out of luck.

I recently came across another similar tool called 'BB FlashBack' which also offers a free express edition helping to record our screen presentations as videos. It also does support audio recording through your computer microphone. Some of the salient features of this tool are:

  1. Options of either a free version of...
Ned Miller | 30 Jun 2011 | 0 comments

I had the opportunity and good fortune to moderate a panel at the 2011 Symantec Government Symposium on the topic of “Continuous Monitoring… What’s Next?” The panel members included spokespersons from NSA and NIST and the CISO’s from IRS and HHS. We agreed prior to the session that the goal of the panel was to communicate to our audience of approximately 100 or so attendees what our real world experiences were in designing and deploying technologies to achieve a state of continuous monitoring. It was all going according to plan until the moment we engaged the audience and started fielding questions.

In the spirit of interacting with today’s younger Internet savvy (a.k.a. teenagers) we polled the room and learned that, out of the 100 or so people in attendance, “continuous monitoring” had a different meaning to different organizations. It was very clear we have a long way to go to deliver on the promise of continuous monitoring...

Rich Lam | 19 Jun 2011 | 1 comment

About a week ago, we added new interactivity to the third banner on the GeoTrust homepage (Now part of Symantec). Upon clicking on the projector graphic, visitors are presented with a modal overlay featuring an embedded video on how more Alexa top 1 million domains are using GeoTrust. It's an infotaining and engaging video. Enjoy!

Gina Sheibley | 17 Jun 2011 | 0 comments

After recent hits to major cloud services, the cloud has been compared to airplanes. The idea is that you’re safer in a plane than a car, but when it goes down it will go down spectacularly, and the impact will be more widespread. However, you can’t approach cloud like you would buying an airline ticket—where cheapest fare takes priority.

In a blog post on Blogs and Discussions, my colleauge Dave Elliott, argues that the move to the cloud is more like a car. Before making your decision, you research the reliability and safety features of different models; you investigate safety; and you check out what others have said. Dave provides six tips on how to approach cloud including: look under the hood, consider your precious cargo and take it for a test drive. Read more.

Kevin | 17 Jun 2011 | 18 comments

Hi all,

I wanted to thank you for this feedback (adding a new "Recent Activity" sort order to forum lists) and let you know we're going to roll this new sort option out to the production server this evening.

Cautionary note: To make this work, we're having to re-index the site (which takes several hours). During that time, the sort order will, indeed, be out of whack.

We hope to have the indexing completed at the latest by Sunday afternoon and at the earliest by Saturday morning (PST).

Thanks again for your support.

CrisPaden | 13 Jun 2011 | 0 comments

Cris Paden, communications manager, Symantec Public Sector organization

Gigi Schumm will post a few of her thoughts after the event, but this year marks the sixth year of Government Symposium and it is the largest event so far.  It’s not surprising given the recent rash of high profile cyber security incidents, whether it’s the data breaches at Sony, Epsilon, the IMF; or the spearphishing attacks on RSA’s Secure ID devices and on targeted Gmail accounts of users.  Government agencies also find themselves in a tremendous period of change.  Last year we barely talked about cloud adoption or the proliferation of mobile devices.  Here we are a year later, and we face a completely different work landscape because of those two issues.  In addition to all of this, we are honored to have Gen. Colin Powell provide the morning keynote at our event, and Rand Beers of DHS provide the luncheon keynote.  I have attended and worked at all...

JBordwine | 13 Jun 2011 | 0 comments

John Bordwine, chief technology officer, Symantec Public Sector organization

What you’re seeing with the latest rash of cyber security incidents is a point we’ve been trying to emphasize for some time now:  With regards to protecting information, the emphasis should be on securing the information and not the devices or the infrastructure.  In addition, more folks are starting to use devices of their own choice to do their job, whether they may or may not be sanctioned by an agency’s IT department.  When you throw in growing use of the cloud and how folks are taking advantage of social networking groups and social media communication for work purposes, it makes focusing on the device even more obsolete.  As such, in my opinion, you’re going to see IT departments become more responsible for managing information, and also developing new policies and practices around the expanding infrastructure.  It used to be when you needed a...