Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Class 'I18nInventory' not found in \Php\Include\Util\util.php

Bugfix in util.php Found in version 12.1.5.If you find this error in the reporting log found at:<...>\Symantec Endpoint Protection Manager\apache\logs\reporting.logIf the reporting.log contains...

View Article


ERROR:I18nInventory could not translate key: Group

Bugfix inventoryreport3.php Found in version 12.1.5.If you find this error in the reporting log found at:<...>\Symantec Endpoint Protection Manager\apache\logs\reporting.logIf the reporting.log...

View Article


Getting wrong OS in your reports?

Bugfix inventoryreport1.php Found in version 12.1.5.If you create reports and find wrong OS-es, e.g. a "Windows" computer, while the computer actually is a "Linux" computer running SAVFL,then you can...

View Article

ImageInvoker v1.1 Ideas/Enhancements

Hi Everyone,If you've got an idea that you've got for ImageInvoker, please drop a comment here. Anything from annoying typos and inconsistencies, to new functionality.At the moment I've got listed...

View Article

Image may be NSFW.
Clik here to view.

VIP Push now available with Symantec Identity: Access Manager

One-touch verification and easy to use PIN makes login easier Symantec Identity: Access Manager (SAM) now supports VIP Push and will soon support VIP Login.VIP PushWhen we introduced VIP Access Push...

View Article


eDiscovery Exchange | The App for eDiscovery Professionals on The Go

A simple Google search for eDiscovery blogs returns approximately 429,000 results.  The sheer volume of content is incredible…hundreds of posts about case law, emerging technology, and the latest...

View Article

Image may be NSFW.
Clik here to view.

Forrester Rates Symantec as Strong Performer in 2015 Wave Research Report for...

Forrester Research published the Forrester Wave: Endpoint Encryption Q1 2015 report on January 16th, 2015. The report examined the top seven endpoint encryption vendors and evaluated how their...

View Article

Cloud Use Cases for Enterprise Vault 11/11.0.1

More options than you think There are many reasons IT organizations move applications to the cloud; cutting infrastructure cost, outsourcing high maintenance systems, providing better reach for mobile...

View Article


60 TB of PST's to Migrate? No Problem!

Migrating PST's to EV We recently helped a Global Financial Services firm eliminate PST's from their environment. Case Study:As a global provider of financial services, this highly regulated...

View Article


Image may be NSFW.
Clik here to view.

CyberWar Games: Do you have what it takes to win?

Share your creative puzzle ideas to win a copy of “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” Twitter カードのスタイル:  summary The best way to understand the complex...

View Article

Image may be NSFW.
Clik here to view.

Turning Mobility to a Winning Advantage

Twitter カードのスタイル:  summary This blog courtesy of: Anthony Tate, Senior Product Marketing Manager EMEADigital technologies have enormous potential to transform how enterprises create revenue and...

View Article

Image may be NSFW.
Clik here to view.

NetBackup 7.6.1 Highlights

Preparing for the NetBackup 5330 Integrated Appliance In the Symantec official blog “A Vision for Converged Backup Infrastructure” published late last year, Matt Cain announced the upcoming...

View Article

Netbackup 7.6 VMware backup fails with error 6

VMware snapshot backup fails with error 6, 90, 23 Netbackup VMware Snapshot Backup fails with Error 6.Other error codes in the logs are 90, 23BPBKAR logs show this:00:47:56.146 [4956.10512] <16>...

View Article


Image may be NSFW.
Clik here to view.

Symantec partners with Global Fund for Women to help close gender gap in STEM

Throughout my career, I have considered myself a staunch advocate for women's rights and women in science, technology, engineering, and mathematics (STEM). I advocate for more women in STEM not just...

View Article

Data Privacy Day 2015

January 28th is national Data Privacy Day, which is aimed at empowering and educating both businesses and their employees about the significance of keeping data private. Read More

View Article


Image may be NSFW.
Clik here to view.

Symantec backup exec 2014 remote agent manual uninstall

Twitter カードのスタイル:  summary If uninstallation of Symantec backup exec remote agent 2014 fails, you can do it manually as below:Map the Symantec backup exec installation server folder on the machine...

View Article

Image may be NSFW.
Clik here to view.

New Veritas Name Blends our History and Vision for Tomorrow’s Data Challenges

Twitter カードのスタイル:  summary Today we announced the selection of Veritas Technologies Corporation as the new name for the standalone information management (IM) company that will be created following...

View Article


Image may be NSFW.
Clik here to view.

Le nouveau nom Veritas est l’association de notre patrimoine et de notre...

Twitter カードのスタイル:  summary Aujourd’hui, nous avons annoncé avoir choisi Veritas Technologies Corporation comme nom pour notre société indépendante de gestion de l’information qui sera créée à l’issue...

View Article

Image may be NSFW.
Clik here to view.

Short, sharp spam attacks aiming to spread Dyre financial malware

Spammers linked to the Cutwail botnet are trying to steal financial information by infecting users with Downloader.Upatre and Infostealer.Dyranges.Read More

View Article

Image may be NSFW.
Clik here to view.

Tell Us What You Want!

What You Really Really Want...In a Website Twitter カードのスタイル:  summary We want to talk to you about what you want in a corporate website. And we'll give you $100 for you to share your opinions,...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>