Video Screencast Help

TechTips

Results for TechTips

Today's workforce is expanding and growing increasingly mobile with each passing year.  As recently as a decade ago, most of us were still sitting at desks typing on computers and answering landlines, and USB storage devices were nonexistent.  But ...
Article by Hear4U | 14 Apr 2009 | 1 comment
More than 75 percent of all email today is spam, placing a significant strain on your network, budget, and employee productivity. While being educated on spam is important, optimizing your messaging security technology is critical to a comprehensive spam ...
Article by Hear4U | 14 Apr 2009 | 0 comments
What allows you to better control your company’s security: intrusion prevention or intrusion detection?     The answer is: Both. Symantec Critical System Protection offers both intrusion detection and proactive behavioral-based host ...
Article by Hear4U | 14 Apr 2009 | 0 comments
Backups and Encryption: A Perfect Match How can you make backup and encryption products work together without having to completely reinvent the wheel? The answer lies in understanding how the encryption works, and ...
Article by Hear4U | 13 Apr 2009 | 0 comments
In November of 2008 the number of unwanted, offensive, and misleading emails sent across the globe plummeted by approximately two-thirds, thanks to the efforts of a group of security researchers who helped shut down an Internet operation known as McColo. ...
Article by akottas | 17 Mar 2009 | 0 comments
Data growth rates of 30% to 50% per year are straining the network and storage capacities of organizations, a phenomenon that is compounded by the large amount of duplicate backup data routinely stored. This exacerbates the time and effort required to ...
Article by Swathi Turlapaty | 17 Mar 2009 | 0 comments
In most enterprises, administrators have a real need to link file system quota management software with their archiving software. But while archiving has helped administrators impose quotas by setting rules, these rules often do not take into account the ...
Article by Swathi Turlapaty | 17 Mar 2009 | 0 comments
In Part 1 of our TechTip, we discussed how lookup API can be used to extract information from customer systems, like LDAP, and save it in custom attribute fields associated with DLP incidents to expedite workflow and automated incident response, and ...
Article by Swathi Turlapaty | 17 Mar 2009 | 0 comments
In this two-part TechTip we’ll discuss how Symantec Data Loss Prevention (DLP) customers use custom attributes to drive more proactive security measures in their organizations. DLP customers who use custom attributes have better insight into data loss ...
Article by Swathi Turlapaty | 17 Mar 2009 | 1 comment
Many businesses find themselves at risk when users host inappropriate or illegal files on corporate property. This practice can leave the company liable to criminal charges in the worst cases, or, at the very least, these files can consume too much ...
Article by Swathi Turlapaty | 17 Mar 2009 | 0 comments