Moving Beyond “Dudes with Spreadsheets”: Monitor and Report on Your NetBackup...
In large environments, it’s imperative to have a sound reporting and monitoring strategy around your backup and recovery infrastructure. You need to know if your backups are running successfully, your...
View ArticleDeployment Solution Presentation From April 2013 User Group Meeting
Here is the PPT deck from the April User Group meeting. If you have any questions reach out to Jon Sharp (jon_sharp@symantec.com).Jon EyreWhatsNew-ext.pptx
View ArticleNew Global Certification Exam Delivery Partner Announced
Train. Certify. Succeed!Symantec to Partner with Pearson VUEEffective June 24, 2013, all Symantec Technical Certification (SCS, SCP) and Technical Accreditation (STS, ASC) exams will be available...
View ArticleBest SEO Services In India
Our Professional SEO Services has the following steps or approachWe make sure that the content of your website is well written and most importantly well presented to the client, in a simple and well...
View ArticleConsumerisation and the evolving service imperative
A couple of weeks ago, Google announced it would be canning its Google Reader service. Not a particularly strategic tool you might think - it simply enabled users to collate and organise feeds from...
View ArticleVision 2013 just days away
I am really looking forward to Vision this year. For me it is a chance to see friends and colleagues from around the world. There are quite a few good sessions this year I am looking forward to.If...
View ArticleMonday - Day 1
Just wrapped up attending IA B48 - Enterprise Vault Administrator’s Secrets, what a great session by Patti Rodgers! I won't steal any of her topics and material as I am sure it will be posted soon...
View ArticleCustomer Quote from General Dynamics about Education Services
This is the first year Symantec Education Services has offered free e-learning at Vision to help customers prepare to get Symantec Certified. According to Vision alumni and customer Melvin Smith from...
View Article2013 ISTR Shows Changing Cybercriminal Tactics
The Symantec Internet Security Threat Report (ISTR) 2013 reveals how the threat landscape is evolving, compiling information from more than 69 million attack sensors in 157 countries around the world....
View ArticleISTR 18: Making Sense of Some Big Numbers
Some of us are numbers people. We like nothing more than digging into a big batch of numbers. I confess I’m the other type of person. I still fumble around a spreadsheet and can’t add without the aid...
View ArticleTackle Windows Migration Now with Symantec
As of April 2014, Microsoft will no longer offer service to Windows XP. With the deadline approaching, many organizations are either preparing or putting off their respective migration to either...
View ArticleInformation Security – How to change your colors
One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career. One of the ways I dealt with...
View ArticleIs your backup strategy working?
Is your backup strategy working for your business? In an environment of exploding data growth, shrinking IT budgets, and increasing regulatory complexity, you need a plan that will help you:•...
View ArticlePhishers Spoof Bank’s Security Guidance Web Page
Contributor: Sandeep IngaleWhen it comes to financial organizations, being informed about best security practices is every customer’s right. Many organizations provide this information on their...
View ArticleDay 2: Vision Hits Its Stride
Today is the day Symantec Vision 2013 ramps up to full speed--with a packed slate of keynotes, super sessions, breakouts and labs, activities, and parties.Power Up at a Vision Super Session After...
View ArticleSymantec Mobile Management Suite Now More Seamless and Secure with Single...
The unstoppable BYOD trend is crossing over to the mainstream and continues to impact the way businesses must think about and address mobile productivity. Users are mastering mobile devices on their...
View Article銀行の Web サイトのセキュリティアドバイスページに偽装するフィッシング詐欺
寄稿: Sandeep Ingaleこと金融機関について言えば、基本的なセキュリティ対策(ベストプラクティス)を知ることは、すべての顧客の持つ権利です。多くの金融機関はこういった情報を Web サイトに掲載しており、顧客が安全を保ちつつサービスを十分に利用するための方法を伝えています。しかし皮肉なことに、顧客を保護するための案内であるはずの、こうした Web...
View ArticleSHA 256 Support For Symantec Code Signing Certificates is Here
Secure Hash Algorithm 256 (SHA-2 or SHA-256) support on Symantec Code Signing for Individuals and Symantec Code Signing for Organizations is available starting April 1st, 2013 on the following Symantec...
View ArticleBoston Marathon Bombing Used in Malicious Spam Campaign
Contributor: Christopher MendesOn the afternoon of April 15, 2013, just when many people were on the cusp of conquering another personal milestone by completing the Boston Marathon, they were hit hard...
View ArticlePerformance tuning keys for VMware backups and restores
The size of the read and write buffers used for the VWware API (VDDK) by Backup Exec can be tuned using the following registry keys:HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Backup Exec For Windows\Backup...
View Article