Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Data Loss Prevention (Vontu)
Showing posts in English
Teresa Law | 21 Oct 2013 | 0 comments

The theme for week three according to the United States Department of Homeland Security focuses on the following:

Education: Highlighting the importance of cyber education and workforce development, including the advancement and opportunities in Science, Technology, Engineering, and Math (STEM) education.

Cyber Awareness should be a priority for everyone in their business and personal lives.  Cyberattacks and cybercrime are on the rise with ransomware and phishing schemes targeting us as we interact with each other online and targeted attacked toward businesses resulting in loss of intellectual property, reputation, or perhaps most distressing of all information about us (social security numbers, credit card numbers, etc.).

However, cyber awareness is not limited to protecting against cyber attacks.   Cyber awareness also means protecting ourselves and...

jjesse | 27 Sep 2013 | 0 comments

The Problem:

Currently within the DLP System there is no way to change a group of agents automatically, the only way is to do this manually through the Enforce Management Console. If you have a large number of agents this needs to be perfomed on it can be tedius. 

In the Management Console navigate to System -> Agents -> Overview and then select the computers you want and under the Actions menu you can change the Endpoint Server these computers communicate with.

Once again this is a bit tedious.

The Solution:

The update_configuration.exe file that is included in the file can solve this problem.  The update_configuration.exe file needs to be in the same location as the Endpoint Agent is installed.

To change the DLP Endpoint Agent server:

  1. Verify the update_configuration.exe file is in the same location as the agent installed
  2. Execute the following command:
linda_park | 25 Jun 2013 | 0 comments

Employees are the backbone of your organization, but they’re also the biggest risk to the very data that makes your business thrive. Whether an insider is malicious in their attempt to take your confidential data for personal gain, or they just don’t know better and mishandle confidential data thereby putting it at risk, insiders significantly contribute to data loss. In fact, according to the latest Ponemon Cost of a Data Breach study, human errors and system glitches caused 64 percent of data breaches last year, while the insider threat has remained the most consistent issue facing security teams over time, increasing 22 percent since the first study. But the insider problem is a solvable one.

To keep corporate data safe, people, processes and technology must holistically address the insider threat. Symantec offers the market-leading data loss prevention (DLP) solution to protect data at rest, in motion and in...

James Hanlon | 10 Jun 2013 | 1 comment

You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently.

Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments are driving cyber strategies, citizens need to be cyber aware, businesses are tabling cyber projects, companies are building cyber capabilities, vendors are creating cyber solutions and consultancies are creating cyber practices to help you enhance your cyber resilience.

With all this hype, the key question is - what is different from the infrastructure and information security we have been doing for years and this new cyber approach? This is a good question because everyone seems to have a different perspective on cyber. And for very good reasons.

At Symantec, we get the opportunity to discuss the different interpretations of cyber with many types of users and businesses – consumers, small and...

Vicky P | 02 May 2013 | 0 comments

Minutes and Upgrade presentation are attached.

darci_hunt | 10 Apr 2013 | 0 comments

The Critical Security Controls (CSC's) are being adopted by federal and state agencies in the U.S., Canada and elsewhere, to increase visibility into advanced threats, to shore up defenses, and ultimately for benchmarking and to improve risk posture.

To increase the limited information currently available about implementing the controls, the SANS Institute is conducting a 20-question survey for IT professionals, business unit managers and security/compliance experts. The survey was developed to find out what controls they're adopting, why, and how. The survey also explores how integrated the CSC's are in organizations that have adopted the controls, and whether any adopters have reached the stage where they can use the controls for benchmarking and to improve their risk postures.

"The Critical Security Controls are successful because of their open community approach - people and...

Antonio Ricci | 15 Mar 2013 | 1 comment

I had the opportunity to read a great post on PCI-DSS ! I want to follow up this topic and focus on implementing and maintaining PCI-DSS with a Data Loss Prevention Solution (DLP).

PCI-DSS is not only a matter of defining controls to respect some requirements. It is really important to guarantee that all the efforts done to respect the requirements will not be cancelled a few months later because nobody is taking care of cardholder data, or brand new unprotected applications work on this information. I will focus on 3 of the PCI-DSS requirements and how a DLP Solution can help during cardholder data lifecycle:

  • Requirement 3: Protect Stored Data
  • Requirement 7: Restrict access to cardholder data by business need-to-know
  • Requirement 10: Track and Monitor all access to network resources and cardholder data.

In order to...

mitch_eich | 01 Mar 2013 | 0 comments

We are pleased to announce the launch of the DLP Upgrade Service Delivery Resource Kit (SDRK)! This is the third in a series of DLP core service offerings that have been developed to enable our community of service delivery consultants. This Service Delivery Recourse Kit contains IP (Intellectual Property) and methodology which align with the features applicable to the latest product release of DLP (Data Loss Prevention). This SDRK is available to Symantec Partners (via PartnerNet / SymIQ for Partners) and Symantec personnel (via SymIQ), effective immediately.


Numerous updates and additions have been incorporated into the collateral in support of this launch, including (but not limited to):

  • Updates and enhancements to the Service Delivery Training courseware with a focus on upgrade Tips & Recommendations.
  • Addition of upgrade activities included in the sample Project Plans provide more detail, especially for...
Pamela Reese | 27 Feb 2013 | 3 comments

SC Magazine hosts an annual awards dinner at the RSA Conference where they honor the information security industry’s most effective solutions, addressing the biggest security challenges facing organizations. Symantec earned 3 SC Awards on February 26, 2013:

Hundreds of vendors who offer a product for the commercial, government, educational, nonprofit or...

kishorilal1986 | 17 Feb 2013 | 1 comment

Dear All,

As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization spending lots of resource and money to make bussiness smooth and secure.

I think this is not just spending the money on IT security and having securty experts. makes u secure by implementing the security solutions. It is equally important to you how intellegently and smartly you take care each sides of security threats and configure it accordingly.

Please also read below threads for getting updates on some recent security threats

  • Shamoon virus targets energy sector infrastructure