Webcast | Marrying the Best of Systems Management and Server Virtualization
Virtualization truly changed the server management landscape. With that in mind, a whole gamut of issues has been introduced. It’s important to understand the best practices for optimal performance of...
View ArticleUsing Symantec Protection Suite Enterprise Edition (SPS EE) to protect...
The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost...
View ArticleSecuring the Walled Garden
A few weeks ago, online tech news site The Verge reported a security hole with Apple’s password reset software. All you needed to reset an Apple Id, it said, was a valid email address and date of...
View ArticleSlides and Notes form Midwest DLP User Group Meeting - Apr. 24, 2013
Minutes and Upgrade presentation are attached.Symantec DLP Midwest User Group Mtg Minutes 04.24.13.docDLP Upgrade2.pptx
View ArticleSpeaking AND Listening: The Key to Effective Stakeholder Communications
Fostering a two-way, inclusive dialogue with stakeholders is key to the success of corporate sustainability programs. But developing a communications strategy that delivers the transparency...
View ArticleSymantec ISTR #SMBchat Recap: Making Smart Decisions as Online Threats Increase
The best way to protect your business is to know what you need to protect it from. Last week, Symantec security experts Kevin Haley and Jay Epton engaged in a Twitter chat with Anita Campbell of Small...
View ArticleThe importance of security certifications
Outsourcing your company’s security demands a supplier that is big enough, resilient enough and secure enough to do the job properly. This is why Symantec.cloud invests so heavily in its...
View ArticleHow to find the meaning of Windows error codes
Error message windows usually contain number codes that sometimes is hard to understand the real meaning. I found a nice app called Error Messages for Windows , a free tool that can help you find out...
View ArticleCyber Security Trends and Threats
Recently, I had the opportunity to speak to an esteemed group of people at the Fordham Law Center on National Security. My topic revolved around the latest Cyber Security Trends and Threats, relying...
View ArticleHelp Topic: Receiving Connect Notifications in Microsoft Outlook Using an RSS...
Want to receive Connect notificationsf in your Outlook RSS folder? It's a great way to find out what's new in the areas that interest you on the Connect site, without cluttering your Inbox with...
View Article.pw URLs in Spam Keep Showing Up
Last week, Symantec posted a blog on an increase in spam messages with .pw URLs. Since then, spam messages with .pw URLs have begun showing up even more. Figure 1. .pw TLD spam message increase...
View ArticleSymantec Vision 2013: It’s a Revolution, Not Evolution
Last month’s Symantec Vision 2013 in Las Vegas gave you a glimpse into what our plans are during the next year for the company, our customers and you, our partners. Setting the tone for the event was...
View ArticleGoogle Glass and Tomorrow's Security Concerns
If you haven’t heard, Google Glass, the latest gadget from the Silicon Valley giant, has set the media and tech world abuzz, with both admiration and controversy surrounding the device. Google Glass...
View ArticleNew Internet Explorer 8 Zero-Day Used in Watering Hole Attack
Microsoft has issued Security Advisory 2847140 in response to reports regarding public exploitation of a vulnerability affecting Internet Explorer 8. Other versions such as Internet Explorer 6,...
View ArticleWhen are Enterprise Vault Trigger Files checked?
When using a trigger file to indicate to Enterprise Vault when items which have been archived are secured (by being backed up or replicated) a question often arises around 'When does this take...
View ArticleArchiving and eDiscovery Sessions
Since many of you couldn't make it to Vision and may not have seen this posted the Vision User Conference section I wanted to call out the Archiving and eDiscovery session that have been made...
View ArticleSpammers Continue to Exploit Mother’s Day
Mother’s Day is celebrated in many countries on May 12 and it’s a day for children, regardless of age, to express their love to their mother by giving her a gift. Spam messages related to Mother’s Day...
View ArticleInformation at the Speed of Light
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc....
View ArticleInternet Explorer 10 Support for Workflow and Servicedesk
Support for Internet Explorer 10. Some of you may be encountering IE 10 now. Microsoft is considering it a critical update, and some patching and update policies are automatically installing it on...
View ArticleFree Deployment Webinar
ITS & Altrinsic Solutions' free Altiris Deployment webinar is just around the corner! Join Mark England to hear Quagmires Quandries and Snake Pits: Don’t Get Stuck on Deployments on Thursday 5/9/13...
View Article