Keep Calm and Do It All... With Veritas Operations Manager 6.1
New Release Think about all the things you need to do in your data center to keep the business happy. Manage multi-vendor storage arrays in your SAN, introduce and manage new SSD/Flash arrays whether...
View Article7 Security Tips To Protect Your Mobile Workforce
We all know that nowadays malware isn't just a PC problem. With increasing numbers of organizations letting employees use their own mobile devices for business purposes, they have a lot on the line....
View ArticleBeta Program for Symantec System Recovery 2013 R2 release
We are happy to announce the Beta Program for Symantec™ System Recovery 2013 R2 release. We are seeking Symantec System Recovery customers who are interested in testing, validating and actively...
View ArticleEnterprise Vault Search (EVS) - Favorites
If you have upgraded to Enterprise Vault 11.0 you must have noticed new version of EV Search.Apart from multiple browser support and enhanced UI there are many new features that are added in the...
View ArticleSymantec Unified Vision takes center stage at Singapore Symposium
Customers, partners and analysts gathered together to hear the latest on Symantec’s unified vision for its security portfolio and insights on the company’s new Managed Security Services – Advanced...
View ArticleEnterprise Vault Search (EVS) - User Preferences
New verison of the Enterprise Vault Search allows end users to set their own preferences.These preferences are saved in the database and hence persisted across sessions and machines.To set preferences...
View ArticleCome convertire file virtuali da VMDK a VHD
2Tware Convert VHD è un utile programma per convertire dischi virtuali di VMware VMDK in un formato Microsoft VHD. Questo tool è in grado di eseguire la conversione dei dischi virtuali creati per...
View ArticleGreen Team Series – Walk. Bike. Bus. Pool. Click. Symantec Wins...
This week we bring you a two-part series highlighting activities across our Green Teams. These are just a snapshot of the numerous activities our Green Teams are contributing to every day ranging from...
View ArticleSymantec Wins Three ChannelPro Readers’ Choice Awards
Earlier this year, more than 800 ChannelPro Network readers cast their votes for the most partner- and SMB-friendly products, technologies, services, programs and professional organizations in the...
View ArticleSEPM infected status determination
infected status Really appreciate some one can shade some light on how does the SEPM determine that a machine has been infected so as what are the conditions that are considered to declare a machine...
View ArticleDragonfly: 妨害工作の危機にさらされる欧米のエネルギー業界
標的から情報を盗み取るサイバースパイ活動の背後にいる攻撃グループが、妨害工作活動を仕掛ける能力を手に入れたようです。続きを読む...
View ArticleRig Exploit Kit Used in Recent Website Compromise
Attackers planted code in a popular Web portal to redirect users to an exploit kit.続きを読む...
View ArticleIt's "Tool Time"
As I mentioned in the welcome post and introduction to the Enterprise Vault Engineering blog, one of our goals is to get under the hood of the product and provide a better understanding of some of the...
View ArticleIt's "Tool Time" - DebugDiag
Getting memory dumps for .NET exceptions IntroductionOften the most difficult types of problems we try to resolve are those where we cannot reproduce the same behavior or error internally that the...
View Article"Error 5 Building Script" with DS6.9 SP6
Never seen this before! Just imported some job binary for normally well behaved jobs on a new DS6.9 SP6 server (on Windows 2008 R2 with SQL Server 2012) and started getting this error on tasks running...
View ArticleMeet the Engineers - Andrew Gilbert
I’ve been part of the Enterprise Vault engineering team for almost 12 years. I started way back when it was still KVS and all the engineers were based in a small office in Reading, UK. In my time, I’ve...
View ArticleShortcuts for Right-to-Left Languages
One of life’s complexities in our ever shrinking world is dealing with different cultures, habits and languages. In the software world, this includes dealing with different character sets, or...
View ArticleDailymotion Compromised to Send Users to Exploit Kit
Attackers made the popular video site redirect users to the Sweet Orange Exploit Kit.続きを読む...
View ArticleDragonfly: Zachodnie firmy z branży energetycznej zagrożone sabotażem
Wymierzona w szereg firm, głównie z sektora energetycznego, trwająca kampania szpiegostwa komputerowego umożliwiła atakującym zorganizowanie działań sabotażowych skierowanych przeciwko ich ofiarom....
View Article