Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts in English
vgtero | 02 May 2014 | 0 comments

A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats.

Despite the fatalistic tone in this report, I don’t believe that as security pros, you are the type who would just shrug your shoulders, say “cie la vie”, continue with business-as-usual, and hope for the best. As security professionals, you are excellent at problem solving and thrive at these challenges! You are probably in the midst of figuring out strategies or executing plans to address these deficiencies and remove these feelings of “security inadequacies”.  Many of you are multi-taskers, shoring up your organization’s security and risk management capabilities; at the same time, executing transformative activities such as migrating applications to a software-defined environment. 

At Symantec, we continue to develop solutions...

Lion Shaikh | 28 Apr 2014 | 0 comments
Sr. No Blank Field Type Reason
1 Destination HTTPS/SSL In endpoint Incidents Destination field is used for file transfer incidents i.e.( where files are transfered from source to destination) and since https/ssl or http transactions do not have this information destination is only populated for CD/DVD & Removable storage Incidents. But still we get the destination URL for http/s incidents which is given in recipient field.
2 Destination Path CD/DVD For CD/DVD Incidents destination path would be CD/DVD Drives and since at the time of writing the files on CD/DVD drives they become un-readable for the internal applications due to which DLP is unable to monitor/ keep track of...
Sym_Chris | 28 Apr 2014 | 0 comments

Top Issues!

In one of our previous blogs (, we looked at the top issues our customers are raising with support. In April, these issues remained in the number one and two slots. Firstly, the Submission of Spam Samples. Many of our customers are now using the Symantec Email Submission Client, installed on their Exchange environments. This tool allows users to submit spam samples directly to our analysis teams, without the need to raise a support case. It really is helping us to help you, so if you aren't using it already, head over to the Downloads section of our customer portal and download the file. It's a quick and easy installation, and a very lightweight add-on.

We're also continuing to see Email Delivery issues as a very common...

James Hanlon | 25 Apr 2014 | 1 comment

The Executive Briefing Center (EBC) for many years has worked with EMEA’s key customers to define their security strategies and demonstrate how Symantec’s solutions can help them meet their business needs.  

With the launch of CyberV Enterprise Assessment (EA) service, the EBC will now act as the CyberV center of excellence (CoE) offering not only the ability to deliver the CyberV EA service for Symantec's customers but also providing complete 'Cyber Customer Experiences' by combing the CyberV assessments with Symantec Security Operation Centre (SOC) tours and cyber solution briefings. 

The CyberV EA service leverages the latest global thought leadership within the area cyber resilience and combines it with Symantec's own cyber insights to provide a 'snapshot' assessment of a customer's current and desired level of cyber resilience. The Cyber EA service provide great value for customers by assessing capability around the four cornerstones of cyber resilience...

riva11 | 24 Apr 2014 | 0 comments

Keeping your web browser up to date is very important for your own safety and security, but also it is important to install the latest add-ons whenever new versions become available.


What is a plugin?

  • Plugins power videos, animation and games
  • They're built outside of Firefox by companies like Adobe Systems and Apple
  • Plugins don't always update automatically.


Why should I update my plugins?

  • Old plugins can interrupt browsing and waste your time.
  • Old plugins increase your risk for attack by malware, viruses, and other security threats.
  • Updated plugins have improvements that make the web better and safer for you.


A simple way to check if you always have running the latest plug-ins is visit the Mozilla Plugin Check...

vgtero | 24 Apr 2014 | 0 comments

With the recently discovered Heartbleed vulnerability, information security professionals and end users are feeling the pressure and impact to better protect their information. The task of securing your organization and information can seem overwhelming.

Don’t miss out on this webcast to get step-by-step instructions on how to protect your business and information, and keep your communications secure. 

Join Us To Learn About:

  • What is Heartbleed and the impact it has
  • Understand how the vulnerability is exploited and how you can detect it
  • Steps you need to take to secure information now and going forward

Register at:

BalaP | 17 Apr 2014 | 0 comments

Symantec has released Endpoint Protection (

This release resolves the Heartbleed OpenSSL vulnerability

Chetan Savade | 17 Apr 2014 | 26 comments

Hello Everyone,

Symantec Endpoint Protection 12.1 Release Update 4 Maintenance Patch 1A (12.1.4104.4130 - 12.1 RU4 MP1a) English has been released and is now available for customers to download on FlexNet. This new SEPM release addresses the OpenSSL “Heart Bleed” vulnerability. Additional language versions will become available throughout the week.

Please refer to the following KB article for additional detail:

Is Symantec Endpoint Protection affected by the Heartbleed OpenSSL vulnerability (CVE-2014-0160)

  • The new SEPM build is labeled RU4 MP1a with a version number of 12.1.4104.4130.
  • This version of the SEPM is supported for migrations over any version of the SEPM (Customer does not need to update to RU4 prior to applying the MP1a)
  • The only...
vgtero | 15 Apr 2014 | 0 comments

What is Heartbleed?

By now, you should be very well aware of vulnerability CVE-2014-0160, nicknamed HeartBleed.  Security engineers at Codenomicon and Google discovered a vulnerability last week in the popular OpenSSL cryptographic software library, an open-source implementation of the SSL and TLS protocols. OpenSSL is used by a large majority of organizations to secure the Internet's traffic. "Heartbleed," allows anyone on the Internet to read the memory of the systems using vulnerable versions of OpenSSL software. This may disclose the secret keys, allowing attackers to decrypt and eavesdrop on SSL-encrypted communications and impersonate service providers. In addition, other data in memory may be disclosed, including names and passwords of the users, or other data stored in memory by the service.  OpenSSL versions 1.0.1...

DeanJC | 14 Apr 2014 | 1 comment

2013 saw an increase in malware signed with valid code signing certificates. How did this happen? Are verified entities actually signing and distributing malware? That does not appear to be the case. Rather, the code signing private keys are being harvested from users' hard drives, extracted and sent to malicious parties. Microsoft identified a Trojan that specifically does just this. It's called Fareit and details about some of the malware signed using this exploit can be found here:

Symantec has come up with a solution to this using a cloud based code signing model. This approach keeps the private keys off developer's hard drives and in a secure environment...