Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Encryption
Showing posts in English
Chetan Savade | 07 Oct 2014 | 0 comments

Hello Everyone,

Symantec Endpoint Encryption v11.0.0 has been released. Release is now available on fileconnect to download.

New enhancements have been introuduced in the release, few of them are listed here:

Feature Highlights:

New integrated Endpoint Encryption client:

o   Built on PGP technology

o   Managed by Symantec Endpoint Encryption Management Server

Various client deployment options:

o   Provides support for never-connected and seldom-connected client deployment

o   Policy delivery though GPO, native policy or install-time policy

o   Seamless user registration and enrollment

Various Drive Encryption Recovery Options:

o   Help Desk...

InsentraCameronM | 14 Jul 2014 | 0 comments

Because of its non-centralised nature, PGP key management can be challenging. This is especially true when you are managing your own PGP keys.

Follow the steps below to get up and running quickly with PGP encryption.

Note: The steps below apply to all PGP/GPG clients.

Personal PGP Key Management

  1. Install a PGP client such as Symantec Encryption Desktop
  2. Create/generate a PGP private key
    1. Ensure that you use a strong pasword
    2. Set an expiry date
    3. Set an appropriate key strength
    4. Create a revocation certificate
  3. Create a PGP public key
    1. Export your public key using the following format for the filename: Firstname Lastname firstname.lastname@domain.com (0xFFFFFFFF) pub.asc
      1. Replace (0xFFFFFFFF) with you PGP public key's fingerprint/key id
  4. Distribute your PGP public...
ryanschoenherr | 08 Jul 2014 | 0 comments

Need complete visibility into your environment?  Do you find yourself reactive to breaches or always behind intrusions?  MetriX dashboards can provide complete visibility into your security environment and give you the power to be proactive!

 

Check out MetriXdashboards for more information and ways to utilize MetriX to increase your efficiency.

 

EP dashboard.png

DLP dashboard.png

 

For more information or to schedule a demo please contact:

Ryan Schoenherr

810-877-1743

...

captain jack sparrow | 03 Dec 2013 | 0 comments

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. Freaky-deaky!
The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached.

ref:
http://www.pcworld.com/article/2068525/researchers...

Tariq Naik | 06 Aug 2013 | 0 comments

This article is written based on wide spread Internet reports from Black Hat Conference at Las Vegas.

Recent advances in math and cryptology research in the academic field indicate that there might be mathematical algorithms or solutions in place to break RSA and Diffie-Hellman based encryption without obtaining the secret key and without the need of massive computing resources for significant durations of time within the next four to five years. These encryption schemes are widely on the Internet today for keeping sensitive date private right from encrypting Internet communications used for electronic commerce to securing software updates to encrypting global corporate and government networks.

The key to the security today is that there are no practical ways or efficient algorithms which can break these encryptions without obtaining the secret keys. The day such algorithms are found the encryption and hence the trust on which the Internet works will be broken.

...
Jonathan Brain | 25 Feb 2013 | 0 comments

If someone knows an easier way to accomplish this, feel free to post and make my life even easier.

The "Export WDE Activity" report from the Universal Server is useful if you need to do things like measuring compliance.  Unfortunately none of the date fields that are exported in the CSV are sortable by MS Excel.  It has been reported that this will be corrected in a future release.  Until that time I needed to come up with a way to use the dates that were there.  I have been trying to use this report to measure compliance within our environment.  Since our client base has grown so has the data within the export and without any purging, finding the right data is challenging. This is what I have come up with to extract usable dates from the Universal Server export.

  1. Export the WDE Event data from the Universal Server & open it
  2. Create a new tab called "Month"
  3. Input the following information on...
Vikram Kumar-SAV to SEP | 04 Feb 2013 | 0 comments

 

Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12..

When we had SAV in the market what our customer needed was just a Antivirus to protect their system from downtime..here antivirus was looked more as a Availability facilitator than a core security product..till early 2000.

Even though we had SCS (firewall and IPS) seclected people used the other features.

Starting from 2006-2007 that was a high rise in malware being created and vulnerabilities being exploited..slowly the trend changed and it all came down to money making malwares..

FakeAntivirus, Downadup, Various Blackmailing Trojans etc..here the audience was not high profile..and SEP 11 very well detect and blocks and does whatever it can..Slowly people started using IPS, ADC and found much more can be done with SEP and they are doing it..

However in last few years there has been...

Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

 

 

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
 
Here's the Link to see the Archived Version: https://www2.gotomeeting.com/register/430279362 or go to our website at www.xcendgroup.com  to...
Mira Davda | 29 May 2012 | 0 comments

Augmented by broadband penetration smaller and emerging cities of India are exploring opportunities offered by the virtual world. This group of connected people and businesses has reached critical mass and is lucrative enough to be targeted by cyber criminals.

Indian Cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly facing the risk of cyber attacks, with one in four bot- infections in India reported in such cities, reveals India findings of Symantec Internet Security Threat Report, Volume (ISTR) 17. Also, some cities that repeatedly appear in the list for origin of phishing in India - Ahmedabad,  Nashik and Coimbatore also figure in the list of bot-infections.  Botnets are networks of zombie machines that are used to perform sophisticated attacks  and conduct coordinated attacks. The presence of bot-infected computers in these locations indicates that they are being inducted as part of a network of compromised...

Srikanth_Subra | 02 May 2012 | 0 comments

Hi

Now a days the data theft is increasing in many organizations which leads to loss of data in turn business.

we can follow the below ways to protect our data which is the valuable resource

1. While we are using any DLP Solutions we can assign least permissions in policies

2. We can restrict the permissions to the important files which we are using based on user level

3. We can use the encryption solutions like PGP encryptions

4. We can restrict the use of removable media like USB and other devices

5. We need to monitor and audit the file transfer sites

6. We need to create security controls if systems are connecting to Wireless

By using the above ways we can still keep in control the data theft.