Video Screencast Help

Defense & Intelligence

Results for Defense & Intelligence

(See my article - Firewall Functionality Option/Idea)   Could we please have an additional option to lockout internet in high risk environment when there is no network activity and  when the screensaver activates (i stress option because not ...
Idea by NortonNut | 09 Apr 2013 | 0 comments
Ronald Reagan Building & International Trade Center Tue, 11 June, 2013 - 8:30 - 15:00 EDT Join ...
Event by MeganI | 27 Mar 2013 | 0 comments
De-Militarized Zone or the DMZ is the portion of the network which has two main specifications: 1-      Contains servers and services which are accessible from outside of the network. 2-      Any access to these servers and transaction with them ...
Article by Farzad | 19 Mar 2013 | 7 comments
This one-page document explains how governments can cost effectively and defensibly manage the eDiscovery lifecycle. Information Governance in a Big Data World.pdf (Archiving and eDiscovery, eDiscovery Platform powered by ...
Article by MeganI | 13 Feb 2013 | 0 comments
This silent demonstration shows how Symantec's integration with Actiance provides a solution to capture IM, Unified Communications, Social Media and Collaboration solutions into Enterprise Vault and makes the content avaialble for discovery in ...
Video by dascott | 05 Feb 2013 | 2 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
Hi Everybody,                       You may be facing lot of problems with a virus infected systems in your  IT environment. Here is a tool which will help your endpoints to recover after a massive virus outbreak. If the endpoints are  heavily ...
Article by Samir Ahmed | 13 Jan 2013 | 1 comment
I need a solution I have recently had to move my DB server which is a Solaris 9 OS box off of domain "A" and on to domain "B". The BE10d is installed on a Windows ...
This issue has been solved
Forum Discussion by Russ K. | 20 Nov 2012 | 2 comments
I need a solution When drilling down into events that are part of a SSIM incident you discover that SEP has detected a number of malware threats. The Data Status ID of the threats ...
Forum Discussion by 0zguR | 14 Nov 2012 | 0 comments
When Erik Hughes, the Principal Product Manager on SWV asked me to write an article on our PolicyPak utility for SWV, I wasn’t exactly sure how to start. As a Group Policy MVP I often think about the big picture problems around desktop management. ...
Article by Jeremy Moskowitz MVP | 08 Nov 2012 | 0 comments