Video Screencast Help
Security Community Blog
Showing posts in English
Chetan Savade | 19 Sep 2014 | 0 comments

Hello Everyone,

Symantec has released new version of Symantec Endpoint Protection.

English versions of Symantec Endpoint Protection 12.1.5337.5000 (RU5) is now available on FileConnect. to download. Other languages versions will be available soon. We shall update you on its availability.

The primary download is distributed into two installation files: Part1_Installation and Part 2_Tools. Please download and extract both files before continuing with the software setup. 

As part of the upgrade to Symantec Endpoint Protection Manager (SEPM) 12.1 RU5, all content converts from full definitions to delta definitions. This process is resource intensive and upgrades may take longer than expected. For more details: 

Symantec Endpoint Protection 12.1.5xxx...

Christopher Johnson | 16 Sep 2014 | 0 comments

On September 15, 2014, Symantec issued a SONAR release via Live Update definitions, which erroneously detected some low prevalence files as malicious. The false positive was reported as a SONAR.SuspLaunch detection.

Symantec discovered the issue and had a roll back release available to the field within forty five minutes.  But unfortunately some customers were affected by the issue.  All customers with current SONAR definitions  will not be affected by the issue. The problem has been corrected.

Symantec is currently addressing the internal factors that caused the problem and will make the proper changes to ensure we do not repeat this issue.

Srikanth_Subra | 10 Sep 2014 | 0 comments

On Tuesday, versions of Internet Explorer began blocking out-of-date ActiveX controls – primarily as a way of preventing security flaws from being exploited and users from being compromised.

The feature, which was discussed by Microsoft in August, works with Internet Explorer 8 through Internet Explorer 11 on Windows 7 SP1 and up, as well as on Windows Server 2008 R2 SP1 and up, according to a post, which adds it is active in all Security Zones except the Local Intranet Zone and the Trusted Sites Zone.

A notification bar in Internet Explorer will let users know when the browser is blocking an outdated ActiveX control, and will offer the option to update, the post indicates, adding that users can interact with parts of the webpage not impacted by the ActiveX control.

The company stated that Internet Explorer...

Kari Ann | 09 Sep 2014 | 0 comments

The best part of my job is when I get to talk to customers using Symantec Endpoint Protection. Like a moth to the flame, I’m curious about how our customers actually use the product, what they love about it, or what drives them a little crazy. Lately, I’ve peppered most conversations with two simple questions: 

1) Are you ready for the upcoming SEP 11 EOSL with up-to-date software? 

2) Are you aware of, and using, the full protection stack in SEP 12.1 (beyond Antivirus)?

In most cases, the answer to one or both questions is a variation of “nope.” Since I can’t talk to EVERY customer, we’re inviting you to take 5 minutes to conduct a Security Self-Assessment and share a few FREE resources that you may not be aware of, to help you maximize your security investment in Endpoint Protection. 


Chip Epps | 09 Sep 2014 | 0 comments

By Deb Banerjee, Symantec Chief Architect, and Jeremiah Cornelius, VMware Technology Alliances Security Architect


Imagine having the ability to ensure protection, provision, manage and respond for security in real time - across multiple applications, operating systems with differing business owners and change-management controls.  What if you could do this through automation that kept pace with the agility standards set for infrastructure-cloud computing? All while reducing complexity with increased visibility and interoperability of different security controls like Anti-Virus and Network Intrusion Prevention?

That ‘s what is now possible, through Software Defined Data Center (SDDC) automation on VMware’s NSX logical micro-segmentation, enhanced with capabilities provided by Symantec’s integration of Data Center Security  (DCS):Server product.

We hear a familiar refrain in recent years, from both IT executives and administrators. “If we...

robertckl | 08 Sep 2014 | 0 comments

As of late 2014, SHA1 certificates and it's SHA1 trust chain (not including the Root CA) will be considered insecure by Google Chrome.

A three step process will increase the severity of the warning:

  1. Initially SHA1 certificates that expire on/after 2017/1/1, and which contain SHA-1-based signatures in the validated chain, will be shown the "Secure, but minor errors" icon.  This is a lock with a yellow triangle alert icon
  2. Severity will increase thereafter, where:  
    SHA1 certificates that expire between 2016/6/1 and 2016/12/31, inclusively, and which contain SHA-1-based signatures in the validated chain, will be shown the "Secure, but minor errors" icon. This is a lock with a yellow triangle....
LeslieMiller | 04 Sep 2014 | 1 comment

New data breaches are frequently reported in the news. What should you be doing to protect your enterprise? We've gathered some of our most recent and frequently accessed articles and blogs in one area for one-stop access to industry-leading information from Symantec.

Recently Published


Related Articles and Videos

To Protect Your POS, Add Layers

How to Secure Your Mobile Point of Sale Devices


khaley | 27 Aug 2014 | 0 comments

The healthcare industry has for years been the number one industry in reported data breaches.  But this dubious honor has been driven in some part because healthcare has the most stringent reporting requirements of any industry.  In other words, unlike other industries, they have to report a data loss.  If every industry had the same reporting requirements, things might look quite different. 

Additionally, while healthcare has had the largest number of reported breaches, it has one of the lowest percentages of actual records lost.   Healthcare has more breaches than other industries, but each loss on average is quite small.

In 2013, according to Symantec’s Internet Security Threat Report (ISTR), 78% of all breaches in healthcare were because of theft or loss of a devices or because the data was accidently made public.  These are preventable breaches...

Chetan Savade | 27 Aug 2014 | 5 comments

This blog contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in Sep 2007.

It contains the Enterprise Editions (EE) and Small Business Editions (SBE)

RTM - Release To Manufacturing

MR - Maintenance Release (replaced by RU)

RU - Release Update

MP - Maintenance Pack

PP - Point Pack


                            SEP Enterprise Edition/Small Business Edtion 12.1.x

Note: SEP 12.1 Enterprise Edition & Small Business Edition have the same version code and product name.



  Release date (English)



 Jul 2011


EfrainO | 25 Aug 2014 | 0 comments

Survey Study Tools
     The following tables, graphs and visualizations are examples of tools for performing continuous surveying of digital populations.

Cohort Study
      A cohort study takes a look at a random sampling of the population and compares it to a known group of infected systems. It than takes a specific variable or set of variables and compares the hosts’ health outcome. In table 1, we can see that users who used a resource from USB were 5.69 times more likely to become infected. This study would warrant further study to ascertain exactly what caused the infection from USB use, but at a minimum a USB protection layer can be considered to reduce the overall probability of an infection outcome. If all the USB borne disease pathogens were executable files, security administrators may consider applying a prevent execution, but allow read and write to/from USB devices policy...