Video Screencast Help

TechTips

Results for TechTips

  With each high-profile data breach or new regulation, security attitudes seem to shift. Instead of the traditional “keep bad guys out” mentality, IT security concerns are increasingly focused on a more complex question: “What is going on here?” ...
Article by Hear4U | 14 Apr 2009 | 0 comments
Today's workforce is expanding and growing increasingly mobile with each passing year.   As recently as a decade ago, most of us were still sitting at desks typing on computers and answering landlines, and USB storage devices were nonexistent.   ...
Article by Hear4U | 14 Apr 2009 | 1 comment
More than 75 percent of all email today is spam, placing a significant strain on your network, budget, and employee productivity. While being educated on spam is important, optimizing your messaging security technology is critical to a comprehensive spam ...
Article by Hear4U | 14 Apr 2009 | 0 comments
What allows you to better control your company’s security: intrusion prevention or intrusion detection?   The answer is: Both. Symantec Critical System Protection offers both intrusion detection and proactive behavioral-based host ...
Article by Hear4U | 14 Apr 2009 | 0 comments
Backups and Encryption: A Perfect Match How can you make backup and encryption products work together without having to completely reinvent the wheel? The answer lies in understanding how the encryption works, and ...
Article by Hear4U | 13 Apr 2009 | 0 comments
In November of 2008 the number of unwanted, offensive, and misleading emails sent across the globe plummeted by approximately two-thirds, thanks to the efforts of a group of security researchers who helped shut down an Internet operation known as McColo. ...
Article by akottas | 17 Mar 2009 | 0 comments
Data growth rates of 30% to 50% per year are straining the network and storage capacities of organizations, a phenomenon that is compounded by the large amount of duplicate backup data routinely stored. This exacerbates the time and effort required to ...
Article by Turls | 17 Mar 2009 | 0 comments
In most enterprises, administrators have a real need to link file system quota management software with their archiving software. But while archiving has helped administrators impose quotas by setting rules, these rules often do not take into account the ...
Article by Turls | 17 Mar 2009 | 0 comments
In Part 1 of our TechTip, we discussed how lookup API can be used to extract information from customer systems, like LDAP, and save it in custom attribute fields associated with DLP incidents to expedite workflow and automated incident response, and ...
Article by Turls | 17 Mar 2009 | 0 comments
In this two-part TechTip we’ll discuss how Symantec Data Loss Prevention (DLP) customers use custom attributes to drive more proactive security measures in their organizations. DLP customers who use custom attributes have better insight into data loss ...
Article by Turls | 17 Mar 2009 | 1 comment