Video Screencast Help

Evolution of Security

Results for Evolution of Security

I need a solution We are developing Entrerprice Security application(Developled using .Net. Windows Application) for authentication purpose. Recently Symantec Endpoint protection ...
Forum Discussion by VULVAJI | 08 Jan 2016 | 11 comments
If you use Symantec’s DeepSight Intelligence you already have the security intel you need. Now there is a way to understand the identified vulnerabilities and the assets they ...
Video by lisawilberding | 28 Dec 2015 | 0 comments
The 3rd party product uninstaller - AppRemover - is a great little product where it uninstall 3rd party AV client when deploying SEP client on them. But the biggest issue with it is that it's VERY limited to specific versions. For example, we have ...
Idea by Tony Sutton | 25 Nov 2015 | 0 comments
I need a solution Hello , is it neccesary to have MD5 of file and file path in fingerprint file used in blacklist mode like : 0bb018fad1b244b6020a40d7c4eb58b7 ...
This issue has been solved
Forum Discussion by Adriatikb | 30 Oct 2015 | 2 comments
I need a solution Hello, We have a plan to upgrade our old PC farm to Windows 7. Our testing machine has installed Windows 7 SP1 (32-bit) and also installed Symantec Endpoint ...
Forum Discussion by loftthehk | 19 Oct 2015 | 4 comments
The SONAR technology within SEP 12 RU6 currently does not detect when an application captures a screenshot without user interaction according to Symantec Technical Support.  The benefit of this would be stopping screen scraping malware that takes a ...
Idea by Steve26134 | 01 Oct 2015 | 0 comments
I need a solution Actual Action Requested Action Secondary Action Event Source Risk Name Left alone Clean Leave ...
This issue has been solved
Forum Discussion by P-nhoy | 29 Sep 2015 | 4 comments
This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
Dear All,  please find attached a (novel) idea in the rough about the evolution of endpoint protection. Your comments, especially on how to improve this paradigm, are welcome. Best, K. Attachment Size ...
Idea by secprac313 | 20 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments