Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts in English
Steve C Blair | 22 Sep 2014 | 0 comments

Building great software begins and ends with you, our customer. By giving you visibility into our software and asking for your feedback, advice, and suggestions, we deliver better software solutions to help you solve your security needs.

Symantec will be releasing a new version of our Data Center Security (DCS) solution in the first half of calendar year 2015. DCS version 6.5 will include an enhanced architecture, deliver a web-based unified console, include support for virtual computing environments and support policy based security controls in an integrated offering.  DCS 6.5 delivers the protection capability to take control of your IT environment by coordinating threat management and collaborative security on virtual workloads.  Additionally DCS 6.5 provides new software defined security functionally to create and orchestrate multi-product security...

Chetan Savade | 19 Sep 2014 | 26 comments

Hello Everyone,

On September 18, 2014, Symantec released Symantec Endpoint Protection 12.1 Release Update 5 (12.1.5). You can download this version from Symantec FileConnect.

Symantec Endpoint Protection 12.1.5 includes a number of new features, including:

Bandwidth throttling to control client/server communication traffic
Content storage optimization that greatly reduces disk space used by Symantec Endpoint Protection Manager. It's applicable only for SEPM not for clients.
Symantec Endpoint Protection for Linux, which allows Linux clients to be managed through the Endpoint Protection Manager
For more information about this release, read the Release Notes or the updated product documentation in the Related Articles section.   

Refer this blog:...

Christopher Johnson | 16 Sep 2014 | 0 comments

On September 15, 2014, Symantec issued a SONAR release via Live Update definitions, which erroneously detected some low prevalence files as malicious. The false positive was reported as a SONAR.SuspLaunch detection.

Symantec discovered the issue and had a roll back release available to the field within forty five minutes.  But unfortunately some customers were affected by the issue.  All customers with current SONAR definitions  will not be affected by the issue. The problem has been corrected.

Symantec is currently addressing the internal factors that caused the problem and will make the proper changes to ensure we do not repeat this issue.

Srikanth_Subra | 10 Sep 2014 | 0 comments

On Tuesday, versions of Internet Explorer began blocking out-of-date ActiveX controls – primarily as a way of preventing security flaws from being exploited and users from being compromised.

The feature, which was discussed by Microsoft in August, works with Internet Explorer 8 through Internet Explorer 11 on Windows 7 SP1 and up, as well as on Windows Server 2008 R2 SP1 and up, according to a post, which adds it is active in all Security Zones except the Local Intranet Zone and the Trusted Sites Zone.

A notification bar in Internet Explorer will let users know when the browser is blocking an outdated ActiveX control, and will offer the option to update, the post indicates, adding that users can interact with parts of the webpage not impacted by the ActiveX control.

The company stated that Internet Explorer...

Kari Ann | 09 Sep 2014 | 0 comments

The best part of my job is when I get to talk to customers using Symantec Endpoint Protection. Like a moth to the flame, I’m curious about how our customers actually use the product, what they love about it, or what drives them a little crazy. Lately, I’ve peppered most conversations with two simple questions: 

1) Are you ready for the upcoming SEP 11 EOSL with up-to-date software? 

2) Are you aware of, and using, the full protection stack in SEP 12.1 (beyond Antivirus)?

In most cases, the answer to one or both questions is a variation of “nope.” Since I can’t talk to EVERY customer, we’re inviting you to take 5 minutes to conduct a Security Self-Assessment and share a few FREE resources that you may not be aware of, to help you maximize your security investment in Endpoint Protection. 

...

Chip Epps | 09 Sep 2014 | 1 comment

By Deb Banerjee, Symantec Chief Architect, and Jeremiah Cornelius, VMware Technology Alliances Security Architect

 

Imagine having the ability to ensure protection, provision, manage and respond for security in real time - across multiple applications, operating systems with differing business owners and change-management controls.  What if you could do this through automation that kept pace with the agility standards set for infrastructure-cloud computing? All while reducing complexity with increased visibility and interoperability of different security controls like Anti-Virus and Network Intrusion Prevention?

That ‘s what is now possible, through Software Defined Data Center (SDDC) automation on VMware’s NSX logical micro-segmentation, enhanced with capabilities provided by Symantec’s integration of Data Center Security  (DCS):Server product.

We hear a familiar refrain in recent years, from both IT executives and administrators. “If we...

robertckl | 08 Sep 2014 | 0 comments

As of late 2014, SHA1 certificates and it's SHA1 trust chain (not including the Root CA) will be considered insecure by Google Chrome.

A three step process will increase the severity of the warning:

  1. Initially SHA1 certificates that expire on/after 2017/1/1, and which contain SHA-1-based signatures in the validated chain, will be shown the "Secure, but minor errors" icon.  This is a lock with a yellow triangle alert icon
     
  2. Severity will increase thereafter, where:  
    SHA1 certificates that expire between 2016/6/1 and 2016/12/31, inclusively, and which contain SHA-1-based signatures in the validated chain, will be shown the "Secure, but minor errors" icon. This is a lock with a yellow triangle....
LeslieMiller | 04 Sep 2014 | 2 comments

New data breaches are frequently reported in the news. What should you be doing to protect your enterprise? We've gathered some of our most recent and frequently accessed articles and blogs in one area for one-stop access to industry-leading information from Symantec.

Recently Published

 

Related Articles and Videos

To Protect Your POS, Add Layers

How to Secure Your Mobile Point of Sale Devices

...

khaley | 27 Aug 2014 | 0 comments

The healthcare industry has for years been the number one industry in reported data breaches.  But this dubious honor has been driven in some part because healthcare has the most stringent reporting requirements of any industry.  In other words, unlike other industries, they have to report a data loss.  If every industry had the same reporting requirements, things might look quite different. 

Additionally, while healthcare has had the largest number of reported breaches, it has one of the lowest percentages of actual records lost.   Healthcare has more breaches than other industries, but each loss on average is quite small.

In 2013, according to Symantec’s Internet Security Threat Report (ISTR), 78% of all breaches in healthcare were because of theft or loss of a devices or because the data was accidently made public.  These are preventable breaches...

Chetan Savade | 27 Aug 2014 | 12 comments

#Updated: 22nd September'2014

This blog contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in Sep 2007.

It contains the Enterprise Editions (EE) and Small Business Editions (SBE)

RTM - Release To Manufacturing

MR - Maintenance Release (replaced by RU)

RU - Release Update

MP - Maintenance Pack

PP - Point Pack

 

                            SEP Enterprise Edition/Small Business Edtion 12.1.x

Note: SEP 12.1 Enterprise Edition & Small Business Edition have the same version code and product name.

 Name

 Version

  Release date (English)

Release Notes

 RTM

 12.1.671.4971   

...