Video Screencast Help

Critical System Protection

Results for Critical System Protection

IT Analytics provides a flexible security structure, modeled off the role and scope security of the Symantec Management Platform. Additionally, because IT Analytics uses standard technologies within Microsoft SQL Server (namely SQL Server Analysis ...
Article by dprager | 24 Sep 2012 | 0 comments
Content: Documentation Related articles Downloads Documentation The Symantec Critical System Protection 5.2 RU9 documentation is provided with the installation media (either CD or archive from ...
Article by Shulk | 23 Sep 2012 | 0 comments
Monitoring Virtual Agents in SCSP Through Syslog Aggregation Abstract: A short HOW-TO article depicting steps for setting up virtual agents in SCSP 5.2 RU8 MP4 for monitoring unsupported platforms via syslog. Overview Most UNIX-flavored ...
Article by Shulk | 23 Sep 2012 | 0 comments
As head of the Field Technology Sales organisation for Symantec in EMEA, I find myself in some extraordinarily interesting meetings. None more so than a recent half-day workshop with our technology peers at VMware down at Frimley in Camberley. It ...
Blog Entry by Neal Watkins | 21 Sep 2012 | 0 comments
Berlin, Germany Tue, 16 October, 2012 - 11:30 CEST - Thu, 18 October, 2012 - 14:00 CEST Zum 8. Mal ...
Event by uspange | 21 Sep 2012 | 0 comments
Symantec Critical System Protection allows organizations to monitor and protect physical and virtual data centers using granular, policy-based controls. Through a combination of host-based intrusion detection, intrusion prevention, and least privilege ...
Video by jjesse | 19 Sep 2012 | 1 comment
I need a solution Why is it so important to embrace https and leave htp behind? its becuase https is secured its becuase https is secured tunnel, no eaves dropping.. HTTPS ...
Forum Discussion by ygamedzro | 16 Sep 2012 | 2 comments
I’ve been hearing and reading about a lot of interesting comments made by various info sec professionals regarding whether or not DLP or anti-virus has outlived its usefulness.  Believe it or not, both of these important technologies are still viable ...
Blog Entry by phlphrrs | 14 Sep 2012 | 0 comments
I need a solution Linux uses the audit.rules file to determine what files get audited. CSP uses the Unix or Linux template to determine auditing. Does CSP parse the /var/log/messages ...
This issue has been solved
Forum Discussion by DerekWarner | 13 Sep 2012 | 1 comment
I need a solution Clearly there are areas where EP and CSP overlap. We currently use EP and are looking at CSP. We currently install most features of EP excluding the email scanning. Is ...
Forum Discussion by John Smithers | 12 Sep 2012 | 2 comments