Enterprise Vault Search (EVS) - Search across Archives
In EV11.0, Enterprise Vault Search (EVS) allows end users to perform search across multiple archives from same or different content source. This feature helps user to find items which may exists in...
View ArticleGo Boldly...Not Blindly
Symantec is known for protecting some of things we care most about. The lifeblood of countless businesses is dependent upon a reliable Symantec software package that is both cost-effective and safe. So...
View ArticleEvolving Telco Technologies Pose New Security Challenges
The telco industry is adapting to meet the needs of customers with more flexible technologies, such as Software-Defined Networking (SDN), and Network Functions Virtualization (NFV). However, these...
View ArticleSymantec Recognized as Leader for Climate Change Transparency
Today, Symantec was recognized by the Carbon Disclosure Project (CDP) as a leader among S&P 500 companies for the depth and quality of the climate change data we disclosed through our 2014 CDP...
View ArticleProtecting Corporate Data in a Franchise Model
In order to optimise the success and operation of a franchising model, which could be an organization with affiliate or agent offices, we recommend there should be IT security standards set that the...
View ArticleOffice of Public Sector Compliance - OPSC
The Office of Public Sector Compliance - OPSC's mission is to asdl;kfj ;lskj as;lkj ;.VPAT™ Voluntary Product Accessibility Templates
View ArticleVPAT™ Voluntary Product Accessibility Templates
VPAT™ Voluntary Product Accessibility TemplatesThe purpose of the Voluntary Product Accessibility Template, or VPAT™, is to assist Federal contracting officials and other buyers in making preliminary...
View ArticleImproving Efficiency and Reducing Risks with Storage Foundation ASLs
There are several aspects that prove that Storage Foundation is an enterprise storage management tool that has been used for years on the most critical environments. Recently I had the opportunity to...
View Article新しい iPhone を保護するための 3 つの簡単な手順
Apple ID のアカウントや iPhone を安全に保つために基本的なセキュリティ対策(ベストプラクティス)を実施することをお勧めします。続きを読む...
View ArticleShellshock: All you need to know about the Bash Bug vulnerability
Web servers at risk as new vulnerability potentially affects most versions of Linux and Unix, as well as Mac OS X.続きを読む...
View ArticleShellshock: All you need to know about the Bash Bug vulnerability
Originally posted in Security ResponseA new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X (which is based around...
View ArticleSymantec Appoints Michael A. Brown CEO
MOUNTAIN VIEW, Calif. – PRESS RELEASE – September 25, 2014– The Board of Directors of Symantec Corp. (NASDAQ: SYMC) today announced the appointment of Michael A. Brown as the company’s CEO, effective...
View ArticleTwitter Chat: Protected Clouds are Better Clouds: Do people trust clouds or...
#DirtyTopics Twitter Chat – October 9, 2014 Topic: Do people trust clouds or do they trust brands?Date: Thursday, October 9, 2014Time: Starts at 11:00 a.m. PT / 2:00 p.m. ETLength: One hourWhere:...
View ArticleNational Hispanic Heritage Month - Say Hi to HOLA Symantec’s Latino Employee...
September happens to be a unique month for Latinos. The 15th marks the anniversary of independence of five Latin American countries: Costa Rica, El Salvador, Guatemala, Honduras, and Nicaragua. Mexico...
View ArticleProtected Clouds are Better Clouds: Do people trust clouds or do they trust...
#DirtyTopics Twitter Chat – October 9, 2014 #DirtyTopics Twitter Chat – October 9, 2014 Topic: Do people trust clouds or do they trust brands? Time: Starts at 11:00 a.m. PT / 2:00 p.m. ET Where:...
View ArticleNext Generation Security Operations Center in Sydney, Australia Positions...
Symantec has recently opened a new Security Operations Center (SOC). What does this move mean for global cyber security, and Symantec's growth in leadership in the field?続きを読む...
View ArticleBackup Exec 2014 Icon Glosasary
Have you ever wondered why your storage/media has a pencil with a red slash through it? Or what the yellow warning triangle is on a remote server? Try refering the the Backup Exec 2014 Icon...
View ArticleSymantec/Light Reading Webcast: When MDM is not enough: Service Provider Key...
Please join Light Reading and Symantec for a webcast titled When MDM is not enought: Service Provider Key Considerations for Monetizing Mobility on October 15, 2014 at 11:00 am ET/8:00 am PT. The...
View ArticleAustralians increasingly hit by global tide of cryptomalware
Australia hit with a 1,300 percent increase of cryptomalware in global surge of cybercriminal activity.続きを読む...
View Article