Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Mail Security for Exchange/Domino
Showing posts in English
Beverly van de Velde | 29 Mar 2012 | 0 comments

Education Enablement Services is developing a Symantec Cloud Security Essentials course that combines the CSA training in order to achieve the CCSK credential & a Symantec Certified Professional (SCP) in Cloud Security credential. 

This is an open call for your experiences with reviewing, designing, or implementing security solutions in a cloud environment.  These could come from situations unique to the cloud (ex. compliance issues for systems in a public cloud) - OR - general security solutions addressed in cloud environments (ex. how existing encryption policies were applied to a cloud architecture). 

We need your:
• Specific examples of security solutions in cloud environments
• Example cloud architectures – good or bad – implemented by customers
• Key questions, challenges, and concerns from customers migrating their infrastructure to...

GrahamA | 11 Jan 2012 | 1 comment

Happy new year to you all!

The Symantec LUA team released version 2.3.1 in Dec. Just a quick status update for you in relation to how things have been going since then.

We've seen over 200 successful customer installs/upgrades of LUA 2.3.1 so far and feedback has been very positive.

As a recap, 2.3.1 introduced the following enhancements:

  • The LUA web server service will now automatically restart if it crashes or terminates unexpectedly.
  • LUA will now automatically install and utilise an optimised private Java Runtime Environment (version 1.6 update 27). This also means it is no longer necessary to separately install a public JRE for use by LUA.
  • It is now possible for LUA to automatically run multiple specified distribution tasks after a download task completes.
  • New quick link added to the user interface which allows customers to quickly and easily capture all LUA-related troubleshooting...
rscovel | 19 Dec 2011 | 4 comments

Symantec Protection Center 2.1 (SPC) has been released!

The Symantec Protection Center Team is proud to announce the release of Symantec Protection Center 2.1 (2.1.0.2075), which was published today to the LiveUpdate Publishing Service.  SPC 2.0 Customers will be notified that an update to SPC is available for download.  This is a LiveUpdate release only.  This update provides fixes for a small number of defects, as well as several major enhancements.

These enhancements include:

  • New Security Audit functionality, and reports
  • New Intrusion Detection System (IDS) signature reports
  • An enhanced Specific Endpoint report
  • SPC Web Interface security certificate management
  • Updated browser compatibility

Full details are found in the SPC 2.1 Release notes (DOC4967...

Dinesh Theerthagiri | 17 Nov 2011 | 1 comment

This article presents information on manual unpacking of protected malicious Windows executables using the OllyDbg debugger. It also involve in fully rebuild the import table so the file can be restored to its original state and executed. Many anti-virus vendors categorized UPX, NsPack, ASpack and many other PE packers as malicious software.

Packers ???

A 'Packer' is a compression routine that squeezes an executable file. These programs created to reduce disk space and make downloads faster. It makes difficult to understand the original file and make it tricky to match the file signature of a compressed file. Packers initially send PE internal structures and then it identifies PE header, Export table, and import table in new structures & attaches code segment before OEP, called as STUB .i.e. the compressed executable is shifted to data section of newly created file. PE header & section header is no more useful since data is compressed means...

KatieBurton | 01 Aug 2011 | 9 comments

Friday July 29th Symantec Protection Center 2.0 was released for General Availability. This release focused on extending the integrations found in our 1.0 release, third party products and the Symantec Global Intelligence Network to provide existing Symantec customers with relevant, actionable security intelligence. See below for an overview of the release and what our beta customers are saying! Protection Center is a free product, available at no additional charge for existing Symantec customers.

Response from Beta Customers

“One stop shop.. In my book it will empower my team.” – Fortune 500 financial services organization
“Install was easy, simply brilliant!” – European IT Value Added Reseller (VAR)
“Already plugging this to my clients, big time” – Enterprise IT Value Added Reseller (VAR)
“Will absolutely recommend to customers with integrated products” – Government IT...

Pamela Reese | 29 Jul 2011 | 0 comments

MSExchange.org holds a monthly readers poll to discover which product is preferred by Exchange administrators in a particular category of third party solutions for Microsoft Exchange Server.  July’s polling topic was antispam, and Symantec Mail Security for Microsoft Exchange was selected as Reader's Choice with 19% of the vote. http://bit.ly/p9Hx59

"Our Readers' Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respective category," said Sean Buttigieg, MSExchange.org manager. "MSExchange.org users are specialists in their field who encounter various solutions for Exchange Server at the workplace. Their vote serves as a solid peer-to-peer recommendation of the winning product."

MSExchange.org is a Microsoft Exchange Server...

SecuredThatToo | 17 Feb 2011 | 1 comment

Symantec just announced a pretty cool, interactive, free tool to help stay abreast of security trends and activities.  It even has historical data!  There’s an online version, a installable Windows gadget and you can access it via your mobile phone!  It's pretty slick!

Online Web Portal:
http://www.nortoncybercrimeindex.com

Windows Gadget Download:
http://www.norton.com/ProtectYourself

Mobile:
http://www.nortoncybercrimeindex.mobi

Check it out!!!

Thanks,
Min Ju

Eric Park | 13 Jan 2011

Even spammers take a holiday break after all.

Spam made up 81.69% of all messages in December, compared with 84.31% in November. We have been tracking the decline in spam for few months now, and there were several interesting developments in this area.

Some botnets went virtually silent around the Christmas holiday, but the break did not last very long. On January 10, the botnet activity returned and we saw a spike in spam volume. There is also an interesting relationship between the uptick in spam to ‘.ru’ domain URL spam messages. To find out more, click here to download the January 2011 State of Spam & Phishing Report, which highlights the following trends:

·         Did Spammers Take a Holiday Break?

·        ...

UCD4me | 05 Jan 2011 | 0 comments

The User Centered Design (UCD) team here at Symantec exists to help make customer experiences easier, more efficient and more useful for you.  Right now, we're ramping up several research projects where we are looking for those in security and compliance with a manger, director or CISO role to give us feedback in the form of short user stories.  This should require only a 30-45 minute commitment on the phone to share experiences and points of pain, and this effort is "product agnostic" so as long as you are involved with security, regardless of products used, we'd like to hear from you!

 

If you are interested, please email Kellie Mecham at kellie_mecham@symantec.com to arrange a date and time for the phone interview. 

 

We look forward to hearing from you!

 

Best wishes,

 

Kellie

 

 

Eric Park | 04 Jan 2011

The monthly State of Spam & Phishing report has been tracking the decline of overall spam in recent months. The chart below shows the global spam volume dropping significantly since August.

An even more significant drop was observed during the Christmas holiday. The chart below shows the global spam volume for the month of December 2010 and first few days of January 2011.

What could have caused such a big drop?  We have some potential answers.  According to MessageLabs, there was a huge reduction in output from the Rustock botnet, which was by far the most dominant spam botnet in 2010.  Since December...