Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Symantec Security Information Manager
Showing posts in English
awgtek variq | 22 Jul 2011 | 0 comments

Problem:

You would like to search the Assets and Policies database for an IP using an Advanced (SQL) Query.

Solution:

In your advanced query enter the following SQL. Then replace [ipnum] with your IP address (i.e. dotted quad IP).

SELECT SYMCMGMT.SYMC_SIM_POLICY.NAME,  SYMCMGMT.SYMC_SIM_ASSET.* FROM SYMCMGMT.SYMC_SIM_ASSET_POLICY_MAP RIGHT JOIN SYMCMGMT.SYMC_SIM_ASSET
on SYMCMGMT.SYMC_SIM_ASSET_POLICY_MAP.ASSET_ID = SYMCMGMT.SYMC_SIM_ASSET.ID
LEFT JOIN SYMCMGMT.SYMC_SIM_POLICY ON SYMCMGMT.SYMC_SIM_ASSET_POLICY_MAP.POLICY_ID = SYMCMGMT.SYMC_SIM_POLICY.ID
 WHERE SYMCMGMT.SYMC_SIM_ASSET.IP = (

SELECT CASE WHEN  (IPNumber - 2147483648) > 0 THEN IPNumber -(2*2147483648) ELSE IPNumber END AS IPNUMBER2  FROM  ( SELECT     16777216 *
CAST(LEFT(IPNumber1, LOCATE('.', IPNumber1, 1)-1) AS BIGINT)     +  65536 * CAST(...

Sean Yarger | 08 Jun 2011 | 2 comments

 

Let’s pretend for a moment that you’re on a business trip. You hear the boarding call for your flight and reach down to grab you laptop – only your laptop isn’t there. Whether it was left at security or snagged by another traveler in the terminal, your laptop is gone and your company data is at risk.

 

So what do you do? Typically you’ll need to make a call to the office, notifying your IT department of the incident. This call will initiate a chain reaction of events set into place to ensure measures are taken to secure the files and equip you with a new device to keep business running as usual. This process typically involves a series of forms, approvals, signatures, etc.

 

While it may sound simple, enforcing processes with effectiveness is one of hardest things for companies to do. With multiple people involved and steps required, any number of things can go wrong, slowing down the process –...

Chad Dupin | 01 Jun 2011 | 0 comments

ITS Partner is looking to hire a few Symantec Security Consultants / Engineers.

 

Location

West Michigan / Grand Rapids, MI Area.

Job Summary

This position will be focused on the implementation of Symantec security products within various customer environments. Job responsibilities include assessing customer needs and expectations, designing solutions to meet those needs, and then implementing the design. In addition to these activities the consultant will participate in the sales process (proposal creation, presentations, sales calls, demos, etc.). This position has the opportunity to grow into a leadership role within ITS to help guide and direct the security team.

Preferred Technical Qualifications

  • Symantec Endpoint Protection
  • Symantec Endpoint Encryption
  • Symantec Data Loss Prevention
  • Control Compliance Suite
  • PGP

Technical Knowledge

...
wongkf | 13 Apr 2011 | 0 comments

Dear all,

This is an email message that I have reveived recently. Please broadcast it to stop the scam. I have checked the email header and confirmed that it was sending through yahoo.co.jp mail server by using an IP address allocated to a country in South East Asia (not Japan).

SecuredThatToo | 17 Feb 2011 | 1 comment

Symantec just announced a pretty cool, interactive, free tool to help stay abreast of security trends and activities.  It even has historical data!  There’s an online version, a installable Windows gadget and you can access it via your mobile phone!  It's pretty slick!

Online Web Portal:
http://www.nortoncybercrimeindex.com

Windows Gadget Download:
http://www.norton.com/ProtectYourself

Mobile:
http://www.nortoncybercrimeindex.mobi

Check it out!!!

Thanks,
Min Ju

UCD4me | 05 Jan 2011 | 0 comments

The User Centered Design (UCD) team here at Symantec exists to help make customer experiences easier, more efficient and more useful for you.  Right now, we're ramping up several research projects where we are looking for those in security and compliance with a manger, director or CISO role to give us feedback in the form of short user stories.  This should require only a 30-45 minute commitment on the phone to share experiences and points of pain, and this effort is "product agnostic" so as long as you are involved with security, regardless of products used, we'd like to hear from you!

 

If you are interested, please email Kellie Mecham at kellie_mecham@symantec.com to arrange a date and time for the phone interview. 

 

We look forward to hearing from you!

 

Best wishes,

 

Kellie

 

 

PaulB | 03 Dec 2010 | 0 comments

 

We had an excellent presentation by Jason Short on the Symantec Workflow Solution with a demonstration of the template capabilities and what can be done.  This was a very interactive meeting with a lot of questions asked and answers given.

The demonstration is available for download at the following link: 

http://files.me.com/jason.short/ycf0c0

Another URL was also offered as a great informative resource:  www.workflowswat.com

 

Chris Sandalcidi also did a brief presentation on PCI security issues and shared an industry report which is posted and available below.

 

All in all, it was a very successful User Group meeting and I am looking forward to our next one!

Spencer Parkinson | 10 Nov 2010 | 0 comments

Symantec was recently named a finalist in multiple categories of the 2011 SC Magazine Awards program. Symantec has been recognized for 10 products in 10 areas of the Reader Trust Award competition, which honors best-in-class security products and services. Symantec’s products were selected from more than 650 entries submitted in more than 30 technology categories.

 

Symantec products honored this year:

Hear4U | 08 Sep 2010

Here's your chance to be "King for a Week" with our new Security Solutions Contest! 

What Is the Security Solutions Contest?
It's all about solving end user questions in the forums area.  We created this contest to help increase the total number of solutions on the Security Community.  We are going to select threads we'd like you to solve, and give you an opportunity to win a weekly prize. Yes, I said "weekly!"  Keep reading to find out more about the prize!

How Do I Participate?
First, if you want to play, pull out your dust-ridden, coffee stained endpoint protection & related security product manuals, re-read all the latest and greatest knowledge base articles, and put your thinking-caps on! 

Why?  Because to be the "King for a Week" in this contest, you need to be able to solve popular forum threads that will be hand...

Aniket Amdekar | 11 Aug 2010 | 0 comments

MS10-049 – Vulnerabilities in SChannel Could Allow Remote Code Execution (980436)

  • Analysis
    This patch addresses 1 remote code execution vulnerability and 1 spoofing vulnerability within the SChannel security package in Windows. Attackers will attempt to lure victims to view an attacker-controlled site, which will execute remote arbitrary code on the victim’s machine.
  • Recommendations
    Administrators are urged to patch all affected systems as soon as possible. There is currently no workaround for the remote code execution vulnerability described in this bulletin. Until patches are complete, a workaround for the spoofing vulnerability can be made. Require mutual authentication on IIS servers.

MS10-051 – Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)...