Video Screencast Help
Security Community Blog
Showing posts in English
MFox70 | 26 Jun 2013 | 0 comments

Patching.

 

It’s a painful topic for most IT professionals, seen as the eternal battle between keeping a system running, functionally up to date yet ensuring it is secure.

Some organisations I talk to have a monthly patching cycle, which takes a week out of every month to complete. Yes, 3 months of the year, they have teams of staff patching applications and servers. This is a costly and time consuming process, and I am sure these engineers would rather be doing something more interesting!

 

Yet it is arguable if a fully patched system really IS secure. Many hacking attempts and malware writers look for vulnerabilities that are not even discovered by the software vendors, a concept known as a Zero Day threat, so having a system that is patched against “ yesterdays’ “ threats is not exactly ideal. Let’s face it, malware writers and hackers create exploits quicker than corporates patch their systems.

...

linda_park | 25 Jun 2013 | 0 comments

Employees are the backbone of your organization, but they’re also the biggest risk to the very data that makes your business thrive. Whether an insider is malicious in their attempt to take your confidential data for personal gain, or they just don’t know better and mishandle confidential data thereby putting it at risk, insiders significantly contribute to data loss. In fact, according to the latest Ponemon Cost of a Data Breach study, human errors and system glitches caused 64 percent of data breaches last year, while the insider threat has remained the most consistent issue facing security teams over time, increasing 22 percent since the first study. But the insider problem is a solvable one.

To keep corporate data safe, people, processes and technology must holistically address the insider threat. Symantec offers the market-leading data loss prevention (DLP) solution to protect data at rest, in motion and in...

tiffany_jones | 20 Jun 2013 | 0 comments

Symantec has been working closely with SANS on the latest revisions to the Critical Security Controls (CSCs) and adoption efforts (https://www.sans.org/critical-security-controls/).  Established in 2008, the CSCs were created to help organizations prioritize security functions that are effective against the latest cyber threats and preventing security incidents. As part of the work undertaken to educate stakeholders and garner broad support, SANS conducted an online survey regarding the attitudes toward the adoption of the Critical Security Controls.  699 people responded.  The largest group to take the survey (nearly 20%) came from government agencies.  Financial Institutions, Education, High Tech, Healthcare, Manufacturing and Utilities were also well represented.  Here is a quick summary of some of the findings:

  1. The primary driver for the CSCs adoption is the...
Elangovan | 19 Jun 2013 | 7 comments

Product: Symantec Endpoint Protection 12.x (Client)

In case observed "Firewall is Malfunctioning" status with SEP after install & "Firewall driver is not loaded" for pointing mouse cursor over SEP system tray icon. Try to do the following to resolve the problem

Manuall steps to bind teefer driver to NIC

1. Open properties of NIC adapter.

2. Click Install and select 'Service' and then click 'Add'

3. Click 'Have Disk' and browse to "<Symantec install path>\12.x.xxxx.xxxx.xxx\Bin"

4. Based on the OS, select 'teefer.inf' file from followng folder and install.

TeeferVista (winVista & win7)

TeeferWin8 (Win8 and above)

TeeferXP (winXP & win2003)

5. Reboot machine and check.

 

Joseph.Rogalski | 13 Jun 2013 | 1 comment

For those of you who don’t know I am a history nut and epically surrounding World War II.  Recently I was watching the history channel as I do when there is nothing on and the program was discussing the Maginot Line.  The fortification that the French constructed along its borders with Germany, at the time it was built it was extolled by military experts as genius.  I believe we all know how the rest of the story goes but one comment did stick out to me when they were describing the thought process behind the line, “Generals always fight the last war, especially if they won it.”
 
I have been meeting with some customers recently that have been dealing with malware outbreaks and they have a few commonalities between them.  First they are using tactics that were used to win the last war.  They are mainly counting on technology that is over five years old, Anti-Virus and additionally not deploying the advanced features in...

toby | 11 Jun 2013 | 1 comment

The Symantec Protection Engine (SPE) Traffic Monitor is a command line tool coming with the installation sources of SPE and can be used for a correct sizing and configuration of a SPE environment.

 

When having a NAS environment (f.e. NetApp) and thinking about protecting it with SPE via RPC, you always have the questions about how many scan servers you may need, with what particular configuration.

 

The SPE Traffic Monitor is helping you to determine statistics that you should be aware of when planning the correct sizing and configuration of SPE and therefore you should consider it in every case. You can also re-run periodically the SPE Traffic Monitor to verify whether your sizing is still adequate for the scan requests that you need to deal with.

 

Technically the Traffic Monitor simulates the SPE and therefore on your NAS System you would need to create still a virus scan configuration. This helps in addition to apply the...

James Hanlon | 10 Jun 2013 | 1 comment

You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently.

Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments are driving cyber strategies, citizens need to be cyber aware, businesses are tabling cyber projects, companies are building cyber capabilities, vendors are creating cyber solutions and consultancies are creating cyber practices to help you enhance your cyber resilience.

With all this hype, the key question is - what is different from the infrastructure and information security we have been doing for years and this new cyber approach? This is a good question because everyone seems to have a different perspective on cyber. And for very good reasons.

At Symantec, we get the opportunity to discuss the different interpretations of cyber with many types of users and businesses – consumers, small and...

Mithun Sanghavi | 06 Jun 2013 | 14 comments

Hello,

Symantec Endpoint Protection 12.1.RU3 has been released on June 6 2013.

You may find the latest release, Symantec Endpoint Protection 12.1.RU3, here:

This build's version is: 12.1.3001.165

Upgrade and Migration paths

Symantec Endpoint Protection 12.1.3 (RU3) can upgrade seamlessly over the following:

  • Symantec Endpoint Protection 12.1.2100.2093 (RU2 MP1)
  • Symantec Endpoint Protection 12.1.2015.2015 (RU2)
  • Symantec Endpoint Protection 12.1.1101.401 (RU1 MP1)
  • Symantec Endpoint Protection 12.1.1000.157 (RU1)
  • Symantec Endpoint Protection 12.1.671.4971 (RTM)
  • Symantec Endpoint Protection 11.x (can be upgraded to enterprise version only)
  • Symantec Endpoint Protection Small Business Edition 12.0

Symantec Endpoint Protection 12.1.3 (RU3...

Mithun Sanghavi | 05 Jun 2013 | 0 comments

Hello,

Here are the Knowledgebase Articles available for Symantec Endpoint Protection SBE 12.1.3001 (RU3) which would assist you to prepare for this Latest Release.

NOTE: This Article would be updated as and when new Articles in reference to Symantec Endpoint Protection SBE 12.1.3001 (RU3) gets published.

 

Product Guides

Release Notes and System Requirements for all versions of Symantec Endpoint Protection and Symantec Network Access Control

http://www.symantec.com/docs/TECH163829

Symantec™ Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control...

Mithun Sanghavi | 05 Jun 2013 | 5 comments

Hello,

Here are the Knowledgebase Articles available for Symantec Endpoint Protection 12.1.3001 (RU3) which would assist you to prepare for this Latest Release.

NOTE: This Article would be updated as and when new Articles in reference to Symantec Endpoint Protection 12.1.3001 (RU3) gets published.

 

Product Guides

Release Notes and System Requirements for all versions of Symantec Endpoint Protection and Symantec Network Access Control

http://www.symantec.com/docs/TECH163829

Symantec™ Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes

...