Knowing Is Half the Battle for Today’s CISOs
By Joe Bertnick, Director of Product Management, Symantec Corp.On the battlefield, a general’s responsibility is to coordinate different bodies of soldiers whose commanders may not know what the...
View ArticleWe are looking for an Altiris Admin
Hello, We have an immediate opening for an Altiris admin in Redwood City. CA. If you would like additional details, please contact me directly @ scurran@informatica.com. Thank you, Sean
View ArticleWebcast focused on "How to Virtualize Microsoft Office".
Hello All,Please find the link to this weeks webcast focused on "How to Virtualize Microsoft Office".https://www-secure.symantec.com/connect/blogs/marc...
View ArticleReset Lost Acer Password With Password Recovery Tools
Are you an Acer computer user and Have you ever come across such forgotten Acer password issue? If so, how can you reset lost Acer Password? Actually, you can still make use of the third-party tool to...
View ArticleStudent wins Brussels cyber readiness challenge
40 security and technology-savvy enthusiasts have participated in Symantec’s first Cyber Readiness Challenge on Belgian soil, last week at Belgium’s Infosecurity 2013 fair in Brussels Expo. The...
View ArticleBusiness advantages from a good Information Management Approach
A good Information Governance approach that include powerful archiving and eDiscovery tools, seems to be useful only for companies working in US or UK and all the countries where internal regulations...
View ArticleSÁLVESE QUIEN PUEDA
El mundo de las redes sociales ha despegado a un ritmo vertiginoso. Sí, se ha vuelto «viral», y tal vez esto sea solo el comienzo. Ahora que millones de personas se han apresurado a comprar los...
View ArticleDie Welle souverän reiten
Wie eine Naturgewalt sind die sozialen Medien über uns hereingebrochen. Sie sind allgegenwärtig, und doch ist ihre derzeitige Beliebtheit vielleicht nur der Anfang. Mit welchem Einsatz Millionen...
View ArticleNew Ransomlock Variant Bypasses Automated Threat Analysis Systems’ Sandboxes
A lot of malware modify themselves to either hide from security software when they copy themselves to the compromised computer or to hinder engineers attempting to analyze the malware by executing the...
View ArticleBackupExec 2012 Hotfix 201596 update warning - loss of storage
Backup Exec 2012 v14.0 Rev 1798 (64Bit)Problem: I used live update to install the 201596 hotfix on my CAS last week. The update showed successful, but after the reboot there were problems. The...
View ArticleSchedule Update for the next releases of Backup Exec
We've been discussing this topic across a number of threads lately, so I thought I'd drop it here for all to see.The development team has been extremely focused on quailty enhancements, as reflected in...
View ArticleNetBackup in VCS environment. Manual start without VCS
My last few cases were cluster related. It's funny, but some customers (and even engineers) always forget how to manage NBU when it's under cluster control. They also believe that they can easily...
View ArticleUnable to Download Application - App Center
Situation:The App Center Icon appears on the home screen. The device is not visible in the App Center yet because the agent software has been dispatched but the rollout of the device has not been...
View ArticleRedesign Of Symantec’s Mobile Website
We recently launched a redesign of our Symantec.com mobile website.With the redesign, users can now enjoy a more consistent look and feel on the mobile site as on the desktop version of the site. The...
View ArticleDo you have a solid Step-By-Step plan for your SYMC 52X0 Appliances (...
Disasters strike when you least expect. Total disaster recovery of your NetBackup appliances requires that you have a secure and reliable way to recover your data when you need it. Learn how...
View Article脅威解析システムのサンドボックスをすり抜ける、Ransomlock の新しい亜種
マルウェアの多くは、自身を変化させる機能を持っています。侵入先のコンピュータに自身をコピーするときにセキュリティソフトウェアの目を逃れること、あるいは解読したメモリ領域を実行したり解読したメモリ値を読み取ったりしてマルウェアを解析しようとするエンジニアの試みを阻害することが目的です。今回のブログでは、メモリを共有して自身の姿を変えるトロイの木馬の動作について説明します。マルウェアのプロセスは、図 1...
View ArticleSymantec Wins Best Channel Commitment Award at ASCII Tampa Success Summit
Symantec's dedication to the MSP community has once again been confirmed by our partners.The MSP program's "4 Pillars" allows partners to more efficiently add Symantec solutions to MSP offerings.1....
View ArticleBogus Asian Chat App Steals Login Information
Contributor: Avdhoot PatilNew methods to entice victims into handing over their personal information are always being devised by the people behind phishing websites and the use of fake social...
View ArticleFacing authentication threats: one time passwords and transaction signing
Authentication is one of the oldest problems of the information security, and it is always a living matter. Getting a user password is the easiest way to gain access to critical systems, steal...
View ArticleIt's an exciting time in the industry
Windows 8 has been released... OK, so I'm not actually that excited about Windows 8 (I'm a Mac user and I like my screen sharp and finger print free). But as usual it was accompanied by a new version...
View Article