Are You Maximizing Your Security Investment in Endpoint Protection?
aka. Links to FREE Security Resources The best part of my job is when I get to talk to customers using Symantec Endpoint Protection. Like a moth to the flame, I’m curious about how our customers...
View ArticleBenchmarking OpenStack Network Performance at Scale
Performance of the network can play a major differentiator in the cloud. Given the problem of having hundreds of tenants sitting on your cloud with several thousand virtual machines sending terabytes...
View ArticleSymantec Intelligence Report: August 2014
Welcome to the August edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam,...
View ArticleInternet Explorer Security
IE Security Internet Explorer security feature blocks outdated ActiveX controls続きを読む...
View ArticleMeet the Engineers - Amol Botre
On and off I have been with Symantec since January 2010. Initially I worked with the Backup Exec Technical Support and later on joined Enterprise Vault Engineering Team as a SQA Engineer.In EV I...
View ArticleEnterprise Vault Search (EVS) - Custom Columns
One of the new feature in Enterprise Vault Search is Customized Columns. As the name suggests you can customize the Columns in the results pane by either selecting or deselecting default columns or by...
View ArticleExtended Validation Solutions for SMB Ecommerce success: Secure128
Guest Blogger: John Monnett, V.P. & Partner, Secure128 Website Security Platinum PartnerShopping Cart Abandonment is a Staggering 70%In 2014 we’re living through an online revolution. When I...
View ArticlePrefetch Analysis in Live Response
The examination of prefetch files is commonly done during live response. They are easy to grab, quick to analyze and can provide useful information when investigating malicious activity.Here is what...
View ArticleNew iPhone could herald change to payments security landscape
The arrival of Apple Pay could help improve point-of-sale security but attackers are also likely to severely test the security of the new technology.続きを読む...
View ArticleSymantec App Center Support for iOS 8 on Day Zero
Apple has announced that iOS 8 will be released on September 17th and will be available for iPhone 4S and later. Symantec is committed to supporting Apple iOS operating system versions on day zero of...
View Article新しい iPhone が決済システムのセキュリティを変革する可能性
Apple Pay の登場によって POS システムのセキュリティが向上する可能性がありますが、攻撃者も新しい技術のセキュリティについて徹底的にテストすると考えられます。続きを読む...
View ArticleGive Employees a Comprehensive Mobility Policy to Ensure Success
As more mobile devices enter the market, and mobile workforces expand across the globe, it's more important than ever for IT to have a solid BYO policy in place. We provide simple guidelines to help...
View ArticleTouchDown Product Update
Integrating TouchDown into the Symantec Mobility Portfolio View the video update with Vizay K and Goutham Sukumar NitroDesk and Symantec have had a long history of partnering together on secure email...
View ArticleGLAAD works with Symantec to bring fairness to its software
When your mission is to protect the world’s information there shouldn’t be categories of content that don’t receive equal treatment. And more importantly, when your company’s values clearly state a...
View ArticleGoogle’s SHA-1 Deprecation Plan for Chrome
The latest news in the SSL and web browser industries is Google’s plans to deprecate SHA-1 in a unique way on upcoming releases of Chrome starting with version 39. Considerably different from...
View ArticleSONAR.SuspLaunch False Positive with Sept 15th SONAR Release
On September 15, 2014, Symantec issued a SONAR release via Live Update definitions, which erroneously detected some low prevalence files as malicious. The false positive was reported as a...
View ArticleEmerging Leaders from the Middle East and Africa Visit Symantec for the 2014...
As many of you know, opening the doors for women to thrive in STEM education and careers is a key focus for Symantec. Our work in this area is driven primarily through initiatives and partnerships...
View Articleディレクトリトラバーサル(CWE-22)の解説
ディレクトリトラバーサル(CWE-22) このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。今回は代表的なWebアプリケーション脆弱性であるディレクトリトラバーサルについて解説をしています。続きを読む...
View Articleクロスサイトリクエストフォージェリ(CSRF, CWE-352) の解説
クロスサイトリクエストフォージェリ(CWE-352) このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。今回は代表的なWebアプリケーション脆弱性であるクロスサイトリクエストフォージェリについて解説をしています。続きを読む...
View ArticleSnifula banking Trojan battles local Japanese security product
Snifula variant blocks image on bank’s website advising users to install PhishWall security software.続きを読む...
View Article