Video Screencast Help
Security Community Blog
Showing posts tagged with Symantec Security Information Manager
Showing posts in English
Sean Yarger | 08 Jun 2011 | 2 comments

 

Let’s pretend for a moment that you’re on a business trip. You hear the boarding call for your flight and reach down to grab you laptop – only your laptop isn’t there. Whether it was left at security or snagged by another traveler in the terminal, your laptop is gone and your company data is at risk.

 

So what do you do? Typically you’ll need to make a call to the office, notifying your IT department of the incident. This call will initiate a chain reaction of events set into place to ensure measures are taken to secure the files and equip you with a new device to keep business running as usual. This process typically involves a series of forms, approvals, signatures, etc.

 

While it may sound simple, enforcing processes with effectiveness is one of hardest things for companies to do. With multiple people involved and steps required, any number of things can go wrong, slowing down the process –...

Chad Dupin | 01 Jun 2011 | 0 comments

ITS Partner is looking to hire a few Symantec Security Consultants / Engineers.

 

Location

West Michigan / Grand Rapids, MI Area.

Job Summary

This position will be focused on the implementation of Symantec security products within various customer environments. Job responsibilities include assessing customer needs and expectations, designing solutions to meet those needs, and then implementing the design. In addition to these activities the consultant will participate in the sales process (proposal creation, presentations, sales calls, demos, etc.). This position has the opportunity to grow into a leadership role within ITS to help guide and direct the security team.

Preferred Technical Qualifications

  • Symantec Endpoint Protection
  • Symantec Endpoint Encryption
  • Symantec Data Loss Prevention
  • Control Compliance Suite
  • PGP

Technical Knowledge

...
wongkf | 13 Apr 2011 | 0 comments

Dear all,

This is an email message that I have reveived recently. Please broadcast it to stop the scam. I have checked the email header and confirmed that it was sending through yahoo.co.jp mail server by using an IP address allocated to a country in South East Asia (not Japan).

SecuredThatToo | 17 Feb 2011 | 1 comment

Symantec just announced a pretty cool, interactive, free tool to help stay abreast of security trends and activities.  It even has historical data!  There’s an online version, a installable Windows gadget and you can access it via your mobile phone!  It's pretty slick!

Online Web Portal:
http://www.nortoncybercrimeindex.com

Windows Gadget Download:
http://www.norton.com/ProtectYourself

Mobile:
http://www.nortoncybercrimeindex.mobi

Check it out!!!

Thanks,
Min Ju

UCD4me | 05 Jan 2011 | 0 comments

The User Centered Design (UCD) team here at Symantec exists to help make customer experiences easier, more efficient and more useful for you.  Right now, we're ramping up several research projects where we are looking for those in security and compliance with a manger, director or CISO role to give us feedback in the form of short user stories.  This should require only a 30-45 minute commitment on the phone to share experiences and points of pain, and this effort is "product agnostic" so as long as you are involved with security, regardless of products used, we'd like to hear from you!

 

If you are interested, please email Kellie Mecham at kellie_mecham@symantec.com to arrange a date and time for the phone interview. 

 

We look forward to hearing from you!

 

Best wishes,

 

Kellie

 

 

PaulB | 03 Dec 2010 | 0 comments

 

We had an excellent presentation by Jason Short on the Symantec Workflow Solution with a demonstration of the template capabilities and what can be done.  This was a very interactive meeting with a lot of questions asked and answers given.

The demonstration is available for download at the following link: 

http://files.me.com/jason.short/ycf0c0

Another URL was also offered as a great informative resource:  www.workflowswat.com

 

Chris Sandalcidi also did a brief presentation on PCI security issues and shared an industry report which is posted and available below.

 

All in all, it was a very successful User Group meeting and I am looking forward to our next one!

Spencer Parkinson | 10 Nov 2010 | 0 comments

Symantec was recently named a finalist in multiple categories of the 2011 SC Magazine Awards program. Symantec has been recognized for 10 products in 10 areas of the Reader Trust Award competition, which honors best-in-class security products and services. Symantec’s products were selected from more than 650 entries submitted in more than 30 technology categories.

 

Symantec products honored this year:

Hear4U | 08 Sep 2010

Here's your chance to be "King for a Week" with our new Security Solutions Contest! 

What Is the Security Solutions Contest?
It's all about solving end user questions in the forums area.  We created this contest to help increase the total number of solutions on the Security Community.  We are going to select threads we'd like you to solve, and give you an opportunity to win a weekly prize. Yes, I said "weekly!"  Keep reading to find out more about the prize!

How Do I Participate?
First, if you want to play, pull out your dust-ridden, coffee stained endpoint protection & related security product manuals, re-read all the latest and greatest knowledge base articles, and put your thinking-caps on! 

Why?  Because to be the "King for a Week" in this contest, you need to be able to solve popular forum threads that will be hand...

Aniket Amdekar | 11 Aug 2010 | 0 comments

MS10-049 – Vulnerabilities in SChannel Could Allow Remote Code Execution (980436)

  • Analysis
    This patch addresses 1 remote code execution vulnerability and 1 spoofing vulnerability within the SChannel security package in Windows. Attackers will attempt to lure victims to view an attacker-controlled site, which will execute remote arbitrary code on the victim’s machine.
  • Recommendations
    Administrators are urged to patch all affected systems as soon as possible. There is currently no workaround for the remote code execution vulnerability described in this bulletin. Until patches are complete, a workaround for the spoofing vulnerability can be made. Require mutual authentication on IIS servers.

MS10-051 – Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)...

Brian Byrnes | 15 Jul 2010 | 0 comments

As an IT consultant I am fully aware that IT management is struggling with whether social media is productive or obstructive for companies and their employees. Software is being developed and policy and restrictions are being decided everyday by IT managers. The security of the networks of various organizations are at stake but the potential for innovation using social media is a large enough incentive for the discussion of how to properly utilize the medium continues. Palo Alto networks came up with a whitepaper, http://bit.ly/d2NZRp, which will explore the issues surrounding social media in the workplace. It is important to not only understand the immediate benefits of doing business how one lives, but the threat it presents to an organization’s greater ROI and productivity when it comes to the server’s safety and security.  If your IT Department wants to block social media apps on the company network...