Video Screencast Help

Evolution of Security

Results for Evolution of Security

Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Hi there I am a network administrator. I face a problem with SEP firewall that seems to be a bug. The scenario is as follows: I have windows clients with managed SEP antivirus installed. Also I have windows 2008 domain and Microsoft ISA serer ...
Idea by adc29s | 22 Dec 2013 | 1 comment
Disclaimer: this may not be an exaustive description of the solution and is intended to be used as a guideline. All information is available in the product documentation, including the Administrator's guide.   There are usually three ...
Article by dcats | 18 Dec 2013 | 1 comment
I need a solution Is it possible to encrypt the iPad, any model? 1 ...
This issue has been solved
Forum Discussion by ferrob00 | 11 Dec 2013 | 5 comments
I do not need a solution (just sharing information) Just spreading the word about a webcast (broadcast earlier today) which provides a good overview of the current threat landscape: ...
Forum Discussion by Mick2009 | 03 Dec 2013 | 0 comments
Introduction This is the third of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 13 Nov 2013 | 12 comments
This is a feature enhancement request. At the moment creating a process set for an application/service is a manual process. What would be ideal would be either something built-in to the agent or a tool that you could give a set of processes or ...
Idea by sunny_yu | 30 Oct 2013 | 0 comments
I do not need a solution (just sharing information) Sharing this information here in Connect as there are many active Mac admins....   Webcast Summary: Are ...
Forum Discussion by Mick2009 | 22 Oct 2013 | 3 comments