Video Screencast Help
Security Community Blog
Showing posts tagged with Email Security.cloud
Showing posts in English
Sym_Chris | 25 Jun 2014 | 0 comments

Here in Symantec.cloud support, we speak to a lot of customers. We handle over 18 thousand client communications a month, via telephone, email, and online chat. It’s no wonder then, that we spend a lot of time looking at all our support data to ensure we do the right thing for you, the client.

One of the things we’ve found is that 1 in 4 support cases are not technical issues, but informational ones. Symantec.cloud put the technical folk right on the end of the phone to give you the best possible help and support. With that in mind, you may sometimes find it more convenient to use some of our other resources;

Online Help:

https://help.symanteccloud.com/Symhelp/Home.aspx/Default

Online Help has been created with set up and configuration in mind. If you are a new administrator or just need a reminder of how things work, there is no better place to learn how to get the...

Sym_Chris | 28 Apr 2014 | 0 comments

Top Issues!

In one of our previous blogs (https://www-secure.symantec.com/connect/blogs/symanteccloud-support-blog), we looked at the top issues our customers are raising with Symantec.cloud support. In April, these issues remained in the number one and two slots. Firstly, the Submission of Spam Samples. Many of our customers are now using the Symantec Email Submission Client, installed on their Exchange environments. This tool allows users to submit spam samples directly to our analysis teams, without the need to raise a support case. It really is helping us to help you, so if you aren't using it already, head over to the Downloads section of our customer portal and download the file. It's a quick and easy installation, and a very lightweight add-on.

We're also continuing to see Email Delivery issues as a very common...

Sym_Chris | 27 Mar 2014 | 0 comments

The big issues!

In our last blog, we noted that the most common issue that causes Symantec.cloud customers to contact support is mail delivery issues. With that in mind, we've prepared a series of videos that we think you'll find useful. They cover how the service works, common delivery issues and how to troubleshoot them.

We hope you find them useful.

Default Chromeless Player
...
Sym_Chris | 21 Mar 2014 | 0 comments

Hello!

Welcome to the first of many Symantec.cloud support blogs! It's been a busy year for everyone, with cloud-based IT solutions continuing to snatch headlines everywhere. We thought it would be a good time to share what we're doing in support.

Top Issues!

Here in support we monitor all of the issues coming through. Two items in particular come up time and time again and they are the most prevalent reasons our customers contact support for 2014 so far.

The first of these is Mail Failures. Symantec.cloud process literally billions of mail connections each week, so a certain degree of mail failures are to be expected. It might surprise you to learn however, that less than 10% of the mail failures investigated are as a result of the Email Security Service. Most mail failures occur with the sender or recipient.

With that in mind, we always advise our customers to read any bounceback message they receive carefully. We've put...

captain jack sparrow | 03 Dec 2013 | 0 comments

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. Freaky-deaky!
The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached.

ref:
http://www.pcworld.com/article/2068525/researchers...

Spencer Parkinson | 02 Oct 2013 | 2 comments

Information Security™ magazine and SearchSecurity.com recently announced the winners of its 2013 Reader’s Choice Awards, which were selected based on feedback by customers who were asked to assess products deployed within their organizations. We’re excited to announce that Symantec was honored with eight awards – four Gold, two Silver and two Bronze –demonstrating significant representation across our diverse portfolio of market-leading security solutions.

Included below is a complete list of Symantec’s wins, which will be featured in the October edition of Information Security magazine and are highlighted online at SearchSecurity.com.

The Information Security magazine and SearchSecurity.com 2013 Readers’ Choice Award winners were selected based on extensive, in-depth discussions and...

Philip Routley | 02 May 2013 | 1 comment

Outsourcing your company’s security demands a supplier that is big enough, resilient enough and secure enough to do the job properly. This is why Symantec.cloud invests so heavily in its infrastructure. Our global footprint includes 18 data centres across four continents, two network operating centres and thousands of servers handling email, Web, and instant messaging traffic.

We apply the highest standards to our data centres because our customers demand the highest levels of confidentiality, data integrity and reliability. Certifications like ISO 27001 and audit report standards like SSAE 16 are vital external instruments to demonstrate the quality and security of our cloud services. 

This post will provide an overview of the various certifications and why they are important

What is ISO 27001?

ISO 27001 is a security management standard to guide the development and implementation of an Information Security Management...

Vikram Kumar-SAV to SEP | 04 Feb 2013 | 0 comments

 

Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12..

When we had SAV in the market what our customer needed was just a Antivirus to protect their system from downtime..here antivirus was looked more as a Availability facilitator than a core security product..till early 2000.

Even though we had SCS (firewall and IPS) seclected people used the other features.

Starting from 2006-2007 that was a high rise in malware being created and vulnerabilities being exploited..slowly the trend changed and it all came down to money making malwares..

FakeAntivirus, Downadup, Various Blackmailing Trojans etc..here the audience was not high profile..and SEP 11 very well detect and blocks and does whatever it can..Slowly people started using IPS, ADC and found much more can be done with SEP and they are doing it..

However in last few years there has been...

Matthew R. Ellison | 20 Dec 2012 | 0 comments

 

A few weeks ago an announcement was made regarding the fact that Disney had acquired Lucasfilm, home of the Star Wars and Indiana Jones franchises. Anybody who, like me, is a Disney fan will know that all of this goes together like peanut butter and jelly. My most treasured pin is Minnie Mouse as the classic Star Wars Princess Leia but that’s just one example of how the two universes have collided. However, what surprised me were the negative remarks from many of my friends and colleagues about what a disaster this was. The comments focused on all the various ways that Disney would betray the Star Wars fans, from commercialisation to characterisation, but it was all negative.

As somebody who is both a lifelong Star Wars fan (I adore all of the films from I to VI. I was 5 when Star Wars came out and I went to the cinema 4 times to see it. My son was 7 when Episode I came out so he grew up watching those, with me enjoying his enjoyment) and a huge Disney...

Matthew R. Ellison | 07 Nov 2012 | 1 comment

Not so long ago I was introduced to a customer who when she discovered I was part of Symantec.cloud, she instantly responded ‘We don’t use the cloud’. As we talked further it became obvious that two things were relevant to this customer. Firstly, her fear was actually one of losing control of important company data. Secondly the reality was that her stance had probably meant she already had lost control of important company data. As this customer performed no monitoring of their staff’s Internet usage and enforced mailbox size limits it is likely staff were already using the cloud.

It is almost a guarantee that people within any organisation that provides Internet access are using tools such as DropBox and Hotmail to store company information. One organisation we dealt with discovered that their project team was using a free consumer file sharing service to store essential customer and internal data rather than pay internally to use the IT provided...