To protect your enterpise, protect your vendors
Let Home Depot be your example We talk a great deal about using strong authentication to secure access for enterprise employees, but often we don’t think about how breaches to vendors could make our...
View ArticleMetrics Cocktail: StatsD+InfluxDB+Grafana
Collecting and analyzing metrics is a key to understand a system’s runtime behaviors and thus to provide a better guideline of optimization. As the user of a metrics system, you might want to collect...
View ArticleArchiving emails and the follow-up flag
Many times when I've used Outlook I have used the follow-up flag to remind me about the item that I'm looking at. Sometimes I use it just so that I can see it in a pile of things within my mailbox,...
View ArticleBEST OF BOTH WORLDS
The recent Symantec Vision 2014 event in London – the culmination of four such global events that also took in Munich, Paris and Dubai – was packed with presentations, break-out sessions and panel...
View ArticleNetBackup 7.6.0.4 (NetBackup 7.6 Maintenance Release 4) and NetBackup...
I’m extremely happy to announce that NetBackup 7.6.0.4 and NetBackup Appliances 2.6.0.4 are now Generally Available!NetBackup 7.6.0.4 is our latest maintenance release for the NetBackup 7.6 line. This...
View ArticleAWS support in Symantec Disaster Recovery Orchestrator
One Click Disaster Recovery to the Cloud Disaster Recovery Orchestrator now supports Amazon Web Services(AWS) as a failover target. With today's new release for Disaster Recovery Orchestrator, you can...
View Article3 Tips to Ensure Your Legal Holds Aren’t Ignored
When I talk to customers, one of their common challenges is to get custodians to acknowledge their Legal Hold notifications. This is even more important considering courts are increasingly imposing...
View ArticleCountdown to Zero Day—Did Stuxnet escape from Natanz?
Symantec's analysis on the Stuxnet worm features in new Kim Zetter book. Today, Kim Zetter released her book, “Countdown to Zero Day”. The book recounts the story of Stuxnet’s attempt to sabotage...
View ArticleNetBackup Appliance 2.6.0.4
Actulización Disponible Ya esta disponible la versión 2.6.0.4 de Symantec NetBackup Appliance.Esta versión incluye actualizaciones de seguridad del sistema, correciones de incidencias y otras nuevas...
View ArticleNetBackup 7.6.0.4 (NetBackup 7.6 Maintenance Release 4) ya esta disponible!
Nos gustaría anunciar que tanto NetBackup 7.6.0.4 como NetBackup Appliances 2.6.0.4 ya están disponibles.NetBackup 7.6.0.4 es en este momento la maintenance release más moderna para NetBackup 7.6....
View ArticleLeading the Way in Addressing Cybersecurity’s Hiring Crisis
In October 2014, Symantec released its FY14 Corporate Responsibility (CR) Report reflecting our deep commitment to building a diverse and inclusive workplace, reducing our environmental impact, and...
View ArticleMicrosoft Patch Tuesday – November 2014
This month the vendor is releasing fourteen bulletins covering a total of 33 vulnerabilities. Fourteen of this month's issues are rated ’Critical’. Hello, welcome to this month's blog on the Microsoft...
View ArticleBeta Program - Symantec Embedded Security: Critical System Protection
Registration Open Symantec are building a new security client designed specifically for embedded systems. We’ve taken the code base of our Critical System Protection client edition re-architected,...
View ArticleConnectivity Update 11.12.14
Updates deployed to the Connect production servers as a result of the code sprint that ended 08 Jul 2014.User Facing: DesktopFixed an issue that was allowing unpublished content to show up on list...
View ArticleSORT support for Disaster Recovery Orchestrator (DRO ) 6.1.1
On Nov 11, 2014, SORT delivered a release specifically focused on supporting the GA release of DRO 6.1.1. For this release, we support the following features for DRO 6.1.1:Custom Reports via the Data...
View ArticleOperation CloudyOmega: Ichitaro zero-day and ongoing cyberespionage campaign...
The campaign was launched by an attack group that has communication channels with other notorious attack groups including Hidden Lynx and the group responsible for LadyBoyle. JustSystems has issued an...
View ArticleCloudyOmega 攻撃: 一太郎のゼロデイ脆弱性を悪用して日本を継続的に狙うサイバースパイ攻撃
今回の攻撃は、LadyBoyle の実行グループや HiddenLynx など、他の悪名高い攻撃グループと密接なつながりのある攻撃グループによって実行されています。...
View ArticleThe four most important online security events of 2014
From major vulnerabilities to cyberespionage, Symantec looks at what the past year has brought and what it means for the future. With such an array of security incidents in 2014—from large-scale data...
View ArticleBackup Exec User Experience Session
This is your opportunity to help shape the future of Backup Exec. Hello!Backup Exec team is currently looking for user feedback on several security features for an upcoming release. If you are...
View ArticleHelp improve our online content for Endpoint Protection!
Give about ten minutes of your time to help Symantec improve its knowledgebase content. We need your help! We would be grateful if you could give us about ten minutes of your time to help Symantec...
View Article