Class 'I18nInventory' not found in \Php\Include\Util\util.php
Bugfix in util.php Found in version 12.1.5.If you find this error in the reporting log found at:<...>\Symantec Endpoint Protection Manager\apache\logs\reporting.logIf the reporting.log contains...
View ArticleERROR:I18nInventory could not translate key: Group
Bugfix inventoryreport3.php Found in version 12.1.5.If you find this error in the reporting log found at:<...>\Symantec Endpoint Protection Manager\apache\logs\reporting.logIf the reporting.log...
View ArticleGetting wrong OS in your reports?
Bugfix inventoryreport1.php Found in version 12.1.5.If you create reports and find wrong OS-es, e.g. a "Windows" computer, while the computer actually is a "Linux" computer running SAVFL,then you can...
View ArticleImageInvoker v1.1 Ideas/Enhancements
Hi Everyone,If you've got an idea that you've got for ImageInvoker, please drop a comment here. Anything from annoying typos and inconsistencies, to new functionality.At the moment I've got listed...
View ArticleVIP Push now available with Symantec Identity: Access Manager
One-touch verification and easy to use PIN makes login easier Symantec Identity: Access Manager (SAM) now supports VIP Push and will soon support VIP Login.VIP PushWhen we introduced VIP Access Push...
View ArticleeDiscovery Exchange | The App for eDiscovery Professionals on The Go
A simple Google search for eDiscovery blogs returns approximately 429,000 results. The sheer volume of content is incredible…hundreds of posts about case law, emerging technology, and the latest...
View ArticleForrester Rates Symantec as Strong Performer in 2015 Wave Research Report for...
Forrester Research published the Forrester Wave: Endpoint Encryption Q1 2015 report on January 16th, 2015. The report examined the top seven endpoint encryption vendors and evaluated how their...
View ArticleCloud Use Cases for Enterprise Vault 11/11.0.1
More options than you think There are many reasons IT organizations move applications to the cloud; cutting infrastructure cost, outsourcing high maintenance systems, providing better reach for mobile...
View Article60 TB of PST's to Migrate? No Problem!
Migrating PST's to EV We recently helped a Global Financial Services firm eliminate PST's from their environment. Case Study:As a global provider of financial services, this highly regulated...
View ArticleCyberWar Games: Do you have what it takes to win?
Share your creative puzzle ideas to win a copy of “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” Twitter カードのスタイル: summary The best way to understand the complex...
View ArticleTurning Mobility to a Winning Advantage
Twitter カードのスタイル: summary This blog courtesy of: Anthony Tate, Senior Product Marketing Manager EMEADigital technologies have enormous potential to transform how enterprises create revenue and...
View ArticleNetBackup 7.6.1 Highlights
Preparing for the NetBackup 5330 Integrated Appliance In the Symantec official blog “A Vision for Converged Backup Infrastructure” published late last year, Matt Cain announced the upcoming...
View ArticleNetbackup 7.6 VMware backup fails with error 6
VMware snapshot backup fails with error 6, 90, 23 Netbackup VMware Snapshot Backup fails with Error 6.Other error codes in the logs are 90, 23BPBKAR logs show this:00:47:56.146 [4956.10512] <16>...
View ArticleSymantec partners with Global Fund for Women to help close gender gap in STEM
Throughout my career, I have considered myself a staunch advocate for women's rights and women in science, technology, engineering, and mathematics (STEM). I advocate for more women in STEM not just...
View ArticleData Privacy Day 2015
January 28th is national Data Privacy Day, which is aimed at empowering and educating both businesses and their employees about the significance of keeping data private. Read More
View ArticleSymantec backup exec 2014 remote agent manual uninstall
Twitter カードのスタイル: summary If uninstallation of Symantec backup exec remote agent 2014 fails, you can do it manually as below:Map the Symantec backup exec installation server folder on the machine...
View ArticleNew Veritas Name Blends our History and Vision for Tomorrow’s Data Challenges
Twitter カードのスタイル: summary Today we announced the selection of Veritas Technologies Corporation as the new name for the standalone information management (IM) company that will be created following...
View ArticleLe nouveau nom Veritas est l’association de notre patrimoine et de notre...
Twitter カードのスタイル: summary Aujourd’hui, nous avons annoncé avoir choisi Veritas Technologies Corporation comme nom pour notre société indépendante de gestion de l’information qui sera créée à l’issue...
View ArticleShort, sharp spam attacks aiming to spread Dyre financial malware
Spammers linked to the Cutwail botnet are trying to steal financial information by infecting users with Downloader.Upatre and Infostealer.Dyranges.Read More
View ArticleTell Us What You Want!
What You Really Really Want...In a Website Twitter カードのスタイル: summary We want to talk to you about what you want in a corporate website. And we'll give you $100 for you to share your opinions,...
View Article