Video Screencast Help
Security Community Blog
Showing posts tagged with Endpoint Protection Small Business Edition 12.x
Showing posts in English
Minh_Phan_at_Symantec | 10 Sep 2010 | 1 comment

An e-mail storm is a sudden spike of email traffic, often caused by malware (like the recent "Here You Have" virus) and users on large distribution lists replying to all. These storms are not just inconveniences – they pose a challenge to email environments as the huge volume of traffic can actually take down servers.

 

The internal nature of these storms also requires products that can both filter internal mail and clean up mail stores. Mail Security for Exchange and Domino integrates with their respective email server environments to uniquely provide coverage of internal mail traffic and storage.

 

The products provide:

1. Outbreak detection: Identify that an active outbreak is occurring because of the volume of traffic generated by the same malicious email

2. Internal mail filtering: Block all internal traffic of the "Here you Have" email using Content...

Hear4U | 08 Sep 2010

Here's your chance to be "King for a Week" with our new Security Solutions Contest! 

What Is the Security Solutions Contest?
It's all about solving end user questions in the forums area.  We created this contest to help increase the total number of solutions on the Security Community.  We are going to select threads we'd like you to solve, and give you an opportunity to win a weekly prize. Yes, I said "weekly!"  Keep reading to find out more about the prize!

How Do I Participate?
First, if you want to play, pull out your dust-ridden, coffee stained endpoint protection & related security product manuals, re-read all the latest and greatest knowledge base articles, and put your thinking-caps on! 

Why?  Because to be the "King for a Week" in this contest, you need to be able to solve popular forum threads that will be hand...

Elspeth Magoria | 07 Sep 2010 | 0 comments
Join Us for an Exclusive Evening With Symantec Security and Backup Experts

Register today to attend an invitation-only information security and backup seminar near you. Get in the huddle with our technical experts as they demo the features of Backup Exec 2010 and Symantec Protection Suites. Enjoy great food and beverages and network with your peers. Be there for a chance to win great prizes - a 32 GB iPad or the grand prize Tech Night Tailgate Package! Space is limited so register today for an event near you.
 

Jimania | 01 Sep 2010 | 1 comment

We could use some advice.  We are an internet marketing company and we get our share of IT questions.  We're not IT people so . . . what would be the best product recommendation for protection against malicious files (trojans, virus, malware, etc.)?  We've probably had better luck with Norton Anti-Virus but would like to know the opinions of others.  Thanks!

Elspeth Magoria | 31 Aug 2010 | 0 comments
Protect Information that Drives Your Business
Get Your Hands on the Ball at Symantec and CDW Tech Nights
Gear up with Symantec and CDW at a free technical seminar and learn how your growing business can easily protect against more risks while storing less data and reducing costs. Join us in a city near you to gain a competitive edge and get answers to data security and backup challenges, common to smaller organizations. Get in the huddle with our technical experts as they share solutions that you can add to your play book to help reduce risks and protect critical information.
Enjoy great food and beverages and network with your peers. Be there for a chance to win great prizes - a 32 GB iPad or the grand prize Tech Night Tailgate Package! Space is limited so register today for an event near you.
Hear4U | 30 Aug 2010 | 4 comments

Hello All,

IT Analytics (ITA) will now be offered to SEP, Altiris and Protection Suite customers for free via FileConnnect.

There will be no changes from how ITA is currently supported.  GDSS will continue to route all ITA calls to the Altiris support team to be resolved.

Below is some general information and links concerning ITA.

 

Thank you,

-Sean Downs

 

Symantec IT Analytics FAQ

 

Q1. What is IT Analytics?

IT Analytics enables users to maximize the value of the data that resides within the Altiris and Symantec Endpoint Protection by incorporating multidimensional analysis and robust graphical reporting features. This allows users to explore the databases without advanced knowledge of databases or third-party reporting tools, empowering them to ask and answer their own questions quickly, easily, and effectively. Features include powerful on-the-fly ad-hoc...

Aniket Amdekar | 11 Aug 2010 | 0 comments

MS10-049 – Vulnerabilities in SChannel Could Allow Remote Code Execution (980436)

  • Analysis
    This patch addresses 1 remote code execution vulnerability and 1 spoofing vulnerability within the SChannel security package in Windows. Attackers will attempt to lure victims to view an attacker-controlled site, which will execute remote arbitrary code on the victim’s machine.
  • Recommendations
    Administrators are urged to patch all affected systems as soon as possible. There is currently no workaround for the remote code execution vulnerability described in this bulletin. Until patches are complete, a workaround for the spoofing vulnerability can be made. Require mutual authentication on IIS servers.

MS10-051 – Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)...

Hear4U | 20 Jul 2010

If you are considering a Symantec product for your business, this is a great place to start!  Let us help you understand how to utilize the power of Symantec's solutions.  Information discussed includes key challenges, environment, applications, services provided, among others.  This new series of Customer Success Stories will focus on both small/mid-size businesses, and enterprise success stories.  Links are generally PDF files.

Small and Mid-Size Business

Apprise Software (U.S.)
For Apprise Software, Symantec Hosted Endpoint Protection provides improved protection, is simple to deploy and easy to use, and will cut its monthly security review time in half.  View story

John Septimus Roe Anglican Community School (Australia)
Since...

dschrader | 24 Jun 2010 | 0 comments

Cisco recently announced end of-sales and the coming end-of-life the Cisco Security Agent (CSA) with support ending in a few years.  CSA users shouldn’t wait until then to switch to a full featured security solution from a vendor that is committed to security.
 
When Cisco first acquired Okena (the creators of CSA), it represented a bold but flawed vision of the future of endpoint security.  The promise behind CSA was proactive, zero-day protection against malicious code and intrusions through rules-based host intrusion prevention system (HIPS).  The implied promise was that behavioral protection would replace signature scanning and eliminate the need for virus protection.  Later, Cisco relented and started recommending that CSA be used in conjunction with an open source antivirus engine called ClamAV.  However, ClamAV has never offered state-of-the-art detection and even combined, CSA and ClamAV lack key layers of protection needed...

PaulB | 22 Jun 2010 | 2 comments

Here is some belated, but valuable information from the last Security & Compliance User Group meeting.

There are slides from a presentation on Data Loss Prevention by a member,

and also slides on Threat and Virus Best Practices by a Symantec SE.