Stop Talking, Start Planting
Plant-for-the-Planet Partnership Raises Awareness about Environmental Sustainability at Vision Symposium event series Symantec Vision is our flagship conference to demonstrate thought leadership and...
View Article¡Backup Exec 2014 ya está disponible!
Anunciamos la disponibilidad de Backup Exec 2014 para todos en América Latina続きを読む...
View ArticleBackup Exec 2014 já está disponível!
Backup Exec 2014 já está disponível!Estou muito feliz por anunciar que o Backup Exec 2014 está disponível para clientesO que há de novo no Backup Exec 2014?Suporte para Servidores Windows Server 2012 e...
View ArticleJoin Symantec and Ruby’s Place, Inc. for the Purple Purse Challenge...
Every Dollar Makes a Difference for Victims of Domestic Violence, Trafficking and Homelessness Who are we and what do we do:Ruby’s Place is the first domestic violence shelter incorporated in the...
View Article有名人のヌード写真流出事件に関連する詐欺にご注意
詐欺師たちは、iCloud の侵害に関する話題や、さらに多くの写真や動画の流出に多くの関心が集まっていることに乗じて悪用しようとしています。続きを読む...
View ArticleNew Endpoint Management Community Product Forum Listings
We've updated the Product Names You may notice a few changes in the Endpoint Management Community product names. We've updated the product names to align more closely with what appears on the...
View ArticleFresh phish served with a helping of AES
Attempts to use encryption to make analysis of phishing websites more difficult may be a sign of things to come.続きを読む...
View ArticleProtect Your POS Environment Against Retail Data Breaches
New data breaches are frequently reported in the news. What should you be doing to protect your enterprise? We've gathered some of our most recent and frequently accessed articles and blogs in one area...
View ArticleAugust 2014: Most Popular Content in the Storage and Clustering Community
Check out what's trending in the community Here is some of August 2014's most viewed content in the Storage and Clustering community:VCS Cluster not Starting.Configure Flexible Storage Sharing using...
View ArticleLinks and Articles About Protecting Your POS System Against Data Breaches
Many of our Partners and Customers may be looking for further information regarding data breaches that are frequently reported in the news. We've gathered some of our most recent and frequently...
View ArticleHow to set autolabel for Daily Diff back up
Hi guysI would like to set auto label for Daily Diff back up .i.e. 1st & 3rd week and 2nd & 4th week with 2sets(4+4 medias).Let me know how to approach this activity in Netbakup software.
View ArticleLittle tip for finding database tables
I often find myself peeking into Altiris databases with the goal of finding a particular piece of information. The only problem is, I rarely know what table it's stored in.There are three options at...
View ArticleApple IDs targeted by Kelihos botnet phishing campaign
Botnet targets Apple customers, launching phishing email campaign to lure victims into disclosing their Apple IDs and passwords.続きを読む...
View ArticleSHA1 certificate shown as insecure or with mix content warning on Google...
As of late 2014, SHA1 certificates and it's SHA1 trust chain (not including the Root CA) will be considered insecure by Google Chrome.A three step process will increase the severity of the...
View ArticleSignificant security challenge for new vehicle communication standard
While V2V communications will enable a range of safety applications, securing the protocol will require a system of unprecedented complexity.続きを読む...
View ArticleFSS World
O mundo do FSSCom o lançamento da suite Symantec Storage Foundation 6.1 foi apresentada uma nova feature denominada FSS (Flexible Storage Sharing). Esta feature tem como objetivo uma quebra de...
View ArticleDelivering Agile Security For Enterprise Clouds with SDDC and...
Together with VMware and additional partners including Palo Alto Networks, and Rapid 7, Symantec is bringing security automation solutions to market that enable agility in security for enterprise...
View ArticleMicrosoft Patch Tuesday – September 2014
This month the vendor is releasing four bulletins covering a total of 42 vulnerabilities. Thirty-six of this month's issues are rated Critical.続きを読む...
View Article3 Steps for Protecting Your Data from Disaster
What matters most is not the size of the ‘storm,’ but the scale of the impact Taking precautions for disaster recovery is not only prudent, but vital for business continuity in today's world. We break...
View ArticleInternational Day of Charity - Celebrating our Philanthropic Efforts
"Let us recognize charity for what it is at heart: a noble enterprise aimed at bettering the human condition. On this International Day, I call on people everywhere to act on the charitable impulse...
View Article