Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

How Ready Is Your Disaster Recovery Plan?

 Disaster recovery testing is not always a favorite topic of IT professionals.  For administrators it often requires late nights or weekend work and for managers it can be costly and disruptive to...

View Article


Netbackup Error When Using UNC Path in Storage Unit in absolute Pathname

 Hi One of our customer wants to give UNC Path in storage Unit in Netbackup,in absolute path name as shown in below screen shot.So after giving the UNC path for eg \\<server name>\<Folder...

View Article


Customer Success Story: Hubei Unicom Cuts Costs, Improves Availability with...

 With nearly 12 million customers paying their bills each month, having 24x7 availability of its billing systems is paramount for Hubei Unicom. To ensure these systems are highly available, Hubei...

View Article

Image may be NSFW.
Clik here to view.

Social Scams - Part 1: Reusing Old Scams to Push Browser Extensions

Last year, we talked about scams and spam circulating on Facebook in our whitepaper. Social networking scammers often reuse common lures to trick users, such as offering free products or additional...

View Article

Image may be NSFW.
Clik here to view.

Social Scams - Part 2: How to Clean Up Your Browser and Facebook Timeline

During recent weeks, I have seen different scams on Facebook attempt to convince users to install Google Chrome extensions. I have noticed some conversations taking place around the scams; people not...

View Article


Is Security a Myth?

Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install...

View Article

Image may be NSFW.
Clik here to view.

Not What It Used To Be -- Endpoint Management evolves into a strategic...

Getting the right endpoint management solution in place is analogous to architecting and erecting a building. So where do you start? Read this interesting article by Patrick Spencer in the latest issue...

View Article

Connect Dev Notes: 03 Apr 2013

User Facing: DesktopAdded a Workflow tab that authors can use to move their submissions through Connect's workflow states. This new feature also gives authors and Community Managers the ability to...

View Article


: State University of New York (SUNY) Upstate Medical University Selects High...

 SUNY’s Upstate Medical University is both a medical center and education institution. With a goal to improve its community through education, patient care, and research, the medical center’s 8,900...

View Article


Image may be NSFW.
Clik here to view.

ソーシャル詐欺 - パート 1: 古い手口を再利用してブラウザ拡張機能のインストールを誘導

シマンテックは昨年、Facebook...

View Article

Image may be NSFW.
Clik here to view.

ソーシャル詐欺 - パート 2: ブラウザと Facebook のタイムラインを正常な状態に戻す方法

この数週間に、Google Chrome の拡張機能をインストールするようユーザーを誘う詐欺が Facebook 上でいくつも確認されています。このような詐欺は、あちこちで話題になっているようですが、詐欺師の投稿した写真を削除する方法や、詐欺の拡散を食い止める方法は知られていません。なかには、あきらめて Facebook...

View Article

Cyber Readiness Challenge - Paris

 Le Cyber Readiness Challenge s’est déroulé à Paris le 27 mars dernier au Palais Maillot. L'évènement a été un succés et nous espèrons que vous vous êtes autant amusés, informés sur cet évènement que...

View Article

Using Symantec Protection Suite Enterprise Edition (SPS EE) to protect...

The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost...

View Article


Deliver on Your Service Level Agreements at Vision

Vision Las Vegas is just around the corner, April 15-18. This year the Information Availability, Intelligence and Data Protection track focuses on business continuity, storage and solid state drives,...

View Article

Customer Success: Florida School District Centralizes Management & Security...

Hillsborough County Public Schools, located in Southwestern Florida, is one of the largest school districts in America, covering a total area roughly the size of Rhode Island. Over the last 10 years,...

View Article


NetBackup Receives the Cisco UCS, VCE vBlock, and SAP HANA Stamp of Approval

Over the years I have talked to literally hundreds of customers about their backup needs. Besides reliability and performance, a key requirement is around flexibility of deployment. Customers don’t...

View Article

How to Implement a Successful Self-Service Strategy webcast - Recording now...

A recording of this webcast is now available here: http://bit.ly/10xFJQPLearn how to implement a successful Self-Service strategy that benefits both end-users and IT while fulfilling end-user...

View Article


The Java Virtual Machine has exited with a code of -1, the service is being...

I found an old thread titled "The Java Virtual Machine has exited with a code of -1, the service is being stopped." but it was closed and locked.  So I'm posting this new info.Using SEP 12.1.2015.2015...

View Article

Image may be NSFW.
Clik here to view.

How to enable Windows firewall setting in Windows 7 machine in SEPM 12.1.2

How to enable Windows firewall setting in Windows 7 machine.Problem:SEP Client disabled Windows 7 firewall setting and showing error (This Setting are being managed by vendor application Symantec...

View Article

Image may be NSFW.
Clik here to view.

Shylock Beefing Up and Looking for New Business Opportunities

Shylock (a.k.a. The Merchant of Malice) is one of the most sophisticated banking Trojan horse programs presently occupying the financial fraud threat landscape. From its humble beginnings in 2011, it...

View Article
Browsing all 5094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>