Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Control Compliance Suite
Showing posts in English
Steve C Blair | 24 Nov 2014 | 0 comments

On behalf of all of us in Product Management and Engineering I would like to thank you for your willingness to be part of the DCS 6.5 Beta. For all of you who also filled in our survey, your anonymous responses were very helpful so we can better understand your needs, environment and the use-cases you want to investigate with our new product.

Updates since last Blog

Over late October and November, a lot of work has been going on with our Engineering teams who are busily preparing for the December Beta drop.  We have had a number of pre-Beta trials running inside the company, defect reviews and have a high confidence you will be impressed with our new UI, product features and flexibility to better secure your workloads in your data center.

You may recall in the previous Beta announcement we said we were investigating doing Hands-On Labs to give customers an opportunity to test without having to setup your own environment. Unfortunately this...

vgtero | 03 Oct 2014 | 1 comment

There is a new vulnerability in the commonly used UNIX shell BASH, which the media is now calling Shellshock.  

What is Shellshock? 

A new vulnerability has been found that potentially affects most versions of the Linux and UNIX operating systems, in addition to Mac OS X (which is based around Unix). Known as the “Bash Bug” or “Shellshock,” the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.

The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and UNIX. Bash acts as a command language interpreter. In other words, it allows the user to type commands into a simple text-based window, which the operating system will then run.

For full details see: the Symantec Security...

Steve C Blair | 22 Sep 2014 | 0 comments

Building great software begins and ends with you, our customer. By giving you visibility into our software and asking for your feedback, advice, and suggestions, we deliver better software solutions to help you solve your security needs.

Symantec will be releasing a new version of our Data Center Security (DCS) solution in the first half of calendar year 2015. DCS version 6.5 will include an enhanced architecture, deliver a web-based unified console, include support for virtual computing environments and support policy based security controls in an integrated offering.  DCS 6.5 delivers the protection capability to take control of your IT environment by coordinating threat management and collaborative security on virtual workloads.  Additionally DCS 6.5 provides new software defined security functionally to create and orchestrate multi-product security...

ryanschoenherr | 08 Jul 2014 | 0 comments

Need complete visibility into your environment?  Do you find yourself reactive to breaches or always behind intrusions?  MetriX dashboards can provide complete visibility into your security environment and give you the power to be proactive!

Check out MetriXdashboards for more information and ways to utilize MetriX to increase your efficiency.

EP dashboard.png

DLP dashboard.png

For more information or to schedule a demo please contact:

Ryan Schoenherr



vgtero | 05 May 2014 | 0 comments

Symantec Vision 2014 has finally arrived and we are excited to welcome all of our attendees! This week’s event offers four days of face-to-face insights, information, and experiences you can use to secure your organization.   

On Wednesday, May 7, we are offering a hands-on lab session to highlight the new capabilities of Symantec Control Compliance Suite Standards Manager 11.0.5, which started shipping on April 15, 2014.   Lab 1381- Enhance Asset Discovery and SCAP 1.2 Compliance for Continuous Monitoring with CCS Standards Manager, will demonstrate how CCS Standards Manager's new network and asset discovery capabilities and SCAP 1.2 support enhances your continuous monitoring objectives. (Lab 1381, Wednesday, May 7, 2-3 pm, Milano 1). 

Control Compliance Suite...

khaley | 05 May 2014 | 1 comment

Hear the word flimflam and you think of a time of straw hats and cardboard suitcases; of grifters pulling into town to take the rubes with patent medicine, three-card monte and the old pigeon drop con.

It would be nice to think that these words don’t get used today because we’ve become so much smarter.  We have information at our finger tips.  We are too smart and sophisticated for flimflam, grifts, ruses, hustles, swindles or bunko to work on us. 

Of course that’s not true.  Words just fall out of fashion.  Today we call them scams and cons.  And while we might be more sophisticated than we were, we remain human and human nature remains just as exploitable as it was a hundred years ago.   Oh, and the Flimflammers have gotten more sophisticated too. They’re now using computers.

Using the Internet to run scams makes sense.  Con is short for confidence.  And where better to gain confidence than among friends and...

vgtero | 02 May 2014 | 0 comments

A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats.

Despite the fatalistic tone in this report, I don’t believe that as security pros, you are the type who would just shrug your shoulders, say “cie la vie”, continue with business-as-usual, and hope for the best. As security professionals, you are excellent at problem solving and thrive at these challenges! You are probably in the midst of figuring out strategies or executing plans to address these deficiencies and remove these feelings of “security inadequacies”.  Many of you are multi-taskers, shoring up your organization’s security and risk management capabilities; at the same time, executing transformative activities such as migrating applications to a software-defined environment. 

At Symantec, we continue to develop solutions...

vgtero | 24 Apr 2014 | 0 comments

With the recently discovered Heartbleed vulnerability, information security professionals and end users are feeling the pressure and impact to better protect their information. The task of securing your organization and information can seem overwhelming.

Don’t miss out on this webcast to get step-by-step instructions on how to protect your business and information, and keep your communications secure. 

Join Us To Learn About:

  • What is Heartbleed and the impact it has
  • Understand how the vulnerability is exploited and how you can detect it
  • Steps you need to take to secure information now and going forward

Register at:

vgtero | 15 Apr 2014 | 0 comments

What is Heartbleed?

By now, you should be very well aware of vulnerability CVE-2014-0160, nicknamed HeartBleed.  Security engineers at Codenomicon and Google discovered a vulnerability last week in the popular OpenSSL cryptographic software library, an open-source implementation of the SSL and TLS protocols. OpenSSL is used by a large majority of organizations to secure the Internet's traffic. "Heartbleed," allows anyone on the Internet to read the memory of the systems using vulnerable versions of OpenSSL software. This may disclose the secret keys, allowing attackers to decrypt and eavesdrop on SSL-encrypted communications and impersonate service providers. In addition, other data in memory may be disclosed, including names and passwords of the users, or other data stored in memory by the service.  OpenSSL versions 1.0.1...

captain jack sparrow | 03 Dec 2013 | 0 comments

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. Freaky-deaky!
The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached.