Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Comment tourner le BYOD à votre avantage ?

La consumérisation des technologies de l’information oblige les DSI à remettre à plat leurs stratégies de sécurité. Dans le cas d’une PME aux ressources limitées, ce nouvel impératif génère des...

View Article


Image may be NSFW.
Clik here to view.

VENTAJAS DEL USO DE DISPOSITIVOS PERSONALES EN LA OFICINA

Ante el fenómeno de la «consumización» de las TI, los profesionales informáticos se ven obligados a abordar la seguridad desde una nueva perspectiva. En las pymes, donde los recursos suelen ser más...

View Article


Image may be NSFW.
Clik here to view.

Ist BYOD Fluch oder Segen?

Die Grenze zwischen privater und beruflicher Nutzung von Informationstechnik schwindet und die IT muss ihre Sicherheitsstrategie überdenken, will sie Herr der Lage bleiben. Vor allem mittelständische...

View Article

Backup: When Having Less Means More

Many small and medium-sized businesses (SMBs) are facing a common growing pain. Lot and lots of data. The amount of data they are storing is increasing enormously, and it’s becoming more and more...

View Article

Through a Handset Darkly: Grasping the BYOD Security Paradigm Shift

* This article originally ran on StateScoop on March 19, 2013. "The golden age never was the present age." That's a quote from Benjamin Franklin, who was about as close to a State CIO as you could get...

View Article


Image may be NSFW.
Clik here to view.

フィッシング詐欺師に執拗に狙われるインドの Web サイト

寄稿: Ayub Khanシマンテックは、危殆化したインドの Web サイトにホストされているフィッシングサイトについて継続的に監視を行っています。2011 年には、危殆化したサイトの詳しい調査を実施しましたが、2012 年もフィッシングサイトについて同様の調査を実施しました。2012 年の 8 月から 11 月にかけて、全フィッシングサイトのうち 0.11% が、危殆化したインドの Web...

View Article

Awareness, Education, and Training

Thanks to regulatory requirements most everyone in the corporate world in the US is required to have official annual information security awareness/education/training. This isn't a bad thing per se,...

View Article

Cyber Readiness Challenge - Paris - Les 5 phases d'une attaque

 Les attaques sont de plus en plus nombreuses et ciblées. Pour bien se défendre, il faut d’abord comprendre les techniques utilisées par les attaquants. Les attaquants utilisent bien souvent des...

View Article


Connect Dev Notes: 22 Mar 2013

User Facing: DesktopAdded more robust image upload tool that allows you to: Upload images to a personal directory on the server.Browse your uploaded images.Resize your uploaded images.Generate...

View Article


Your chance to be famous

Happy Friday Morning! It's coming up to 9.00 am here in California and so far it's turning out to be a beautiful day. The sky is blue, the sun is out in full force and the landscape around me is simply...

View Article

How to Create a Report for the Results of a Filter, in Order to Save as CSV

I was wanting to save the results of a filter to an Excel file today, and I found that the filter did not have a "Save As" button. I found an article here that explained it, but I modified the report...

View Article

Symantec Endpoint Protection 12.1 “This software requires the Mac OS X BSD...

Here is a work around (below) for this issue.  I tried the above method must the Info.plist file want not in the format shown) -1.  Log into your Mac as an account with administrator rights2.  Open...

View Article

Image may be NSFW.
Clik here to view.

New Tidserv Variant Downloads 50 MB Chromium Embedded Framework

Tidserv (a.k.a. TDL) is a complex threat that employs rootkit functionality in an attempt to evade detection. The malware continues to be on the Symantec radar since its discovery back in 2008. The...

View Article


Learn to "Cut the Clutter" @ Vision 2013 in Las Vegas

 It’s no secret that email and file data continue to grow exponentially.   At the same time new regulations such as Dodd-Frank and FINRA 10-06 & 11-39 require even more content to be captured and...

View Article

Image may be NSFW.
Clik here to view.

Different Wipers Identified in South Korean Cyber Attack

Our analysis of Trojan.Jokra, the threat which recently caused major outages within the Korean Broadcasting and Banking sectors, has produced another wiper.Security researchers the past few days have...

View Article


Image may be NSFW.
Clik here to view.

Unable to Archive Public Folder Tree with Enterprise Vault

 Some people might say that it's a minor annoyance, but inconsistencies really bug me.  What am I talking about?  I'm talking about being able to archive a whole folder with the Enterprise Vault...

View Article

MS12-060 Compliance Result Dropping Abruptly Since the Latest PMImport

I have a customer that is following the compliance status of their computer for MS12-060 in details (as this vulnerability as a high priority in their environment) and yesterday they got back to find...

View Article


NetBackup Snapshot Client Method

  In the Computer and Storage World a snapshot is the state of a system at a particular point in time. More in detail, a snapshot is a point-in-time, read-only, disk-based copy of a client volume (see...

View Article

Where to check the EOL or any Release Details for a Symantec Product/Solution

Product or Solution release details includes the following:VersionRelease TypeRelease DateEnd of LifeEnd of Limited SupportLast date for patch releasesEnd of Support LifeLast date to contact supportTo...

View Article

Storage Optimization - Part IV - Tiering - SmartTier

As in my series of blogs around Storage Optimization there is a commonality about the recognition of the"data explosion" conundrum, and how this is a placing an extra burden on an already stretched IT...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>