Announcing Managed PKI Service v8.7
Follow Managed PKI on Twitter @SymantecMPKISymantec Managed PKI (MPKI) 8.7 is now live - with improvements to ease of use and manageability, stronger integrations with Mobile Device Management (MDM)...
View ArticleWhat Will Be Your Favorite Presentation at Vision 2013? YOURS!
The Vision 2013 Call for Papers is now open. Do you have a case study featuring successful implementations of Symantec products? Or best practice tips and trick using Symantec solutions? The Vision...
View ArticleWhat Will Be Your Favorite Presentation at Vision 2013? YOURS!
The Vision 2013 Call for Papers is now open. Do you have a case study featuring successful implementations of Symantec products? Or best practice tips and trick using Symantec solutions? The Vision...
View ArticleWhat Will Be Your Favorite Presentation at Vision 2013? YOURS!
The Vision 2013 Call for Papers is now open. Do you have a case study featuring successful implementations of Symantec products? Or best practice tips and trick using Symantec solutions? The Vision...
View ArticleTrojan.Pandex - 新たなスパム活動
寄稿: Lionel Payet先週、W32.Waledacが W32.Virutと共存している現状をお伝えしましたが、Trojan.Pandex(別名 Cutwail)など他のスパムボットネットも、依然として拡散の試みを続けていることを忘れてはなりません。W32.Cridexを操る攻撃者は、さまざまな攻撃経路を使ってマルウェアを拡散しています。たとえば Blackhole...
View ArticleMDK: 中国で最大のモバイルボットネット
2012 年 2 月のブログで、Android.Bmaster(別名 Rootstrap)についてご報告しました。数十万台のデバイスが感染し、その時点で、それまでに記録された最大のモバイルボットネットでした。最近その Bmaster の規模を上回ったのが、新たに発見された MDK ボットネットです。Android.Troj.mdk と命名され、Kingsoft 社によれば 7,000...
View ArticleNetBackup Appliance Technical Workshops - Please Join Us!
Our place is holding some events on 27th and 28th February in the UK so i thought I would invite you all - I have added them to the events calendar but thought it may have better visibility here - hope...
View ArticleSymantec System Recovery 2013 Monitor
Hi All.In this blog we are going to talk about SSR Monitor, a lightweight application that helps monitor the backup status of up to 100 machines. As a user you may want to just get a quick overview of...
View ArticleLastPSTSearch
Have you ever wondered what the LastPSTSearch registry entry was on a client / Outlook workstation with Enterprise Vault in the environment? Well, for quite some time when I was working with PST...
View ArticleEV 10.0.3 Release now supports SharePoint 2013
Enterprise Vault 10.0.3 was released on January 18, 2013 and in addition to many new enhancements for Exchange, it also adds support for SharePoint 2013. The Enterprise Vault team has focused a lot of...
View ArticleSymantec Announces New Strategy; Partnerships continue critical role in...
On January 23, Symantec announced a new strategy to significantly improve performance for you and your customers. We plan to improve existing products and services, and at the same time develop new,...
View ArticleBackup Exec @ Symantec Vision 2013
It's an exciting time for IT professionals. Symantec's annual conference, which is being held at the MGM in Las Vegas this year, is right around the corner. It runs from the 15th April to the 18th...
View ArticleTrojan Horse Using Sender Policy Framework
It is important for malware authors to keep a solid network connection between their malware on compromised computers and their own servers so that the malware can receive commands and be updated....
View ArticleAdobe Reader 11 (XI) is out
Voici la nouvelle version de Adobe Reader 11Adobe Reader XI is free to distribute as long as a current Distribution License Agreement is in effect. If you need to renew your license or apply for a new...
View ArticleAltiris 7.1 migration- End of week 3.
The white board sessions seems to get longer, and the endless syntex errors are just a blur dulled by time.But we are making steady progress. Altiris 7 doesnt suck like everyone said it would, and...
View ArticleTripti Rajusth
Please mark thread as solved if you consider this to have answered your question(s)
View ArticleSPF(Sender Policy Framework)を利用するトロイの木馬
マルウェア作成者にとっては、コンピュータに侵入を果たしたマルウェアと、自分たちが運用するサーバーとの間でネットワーク接続を確保することが重要です。マルウェアがコマンドを受信したり、マルウェアを更新したりするために必要だからです。しかし、マルウェアとマルウェアサーバーとの間の通信は、ゲートウェイやローカルファイアウォールによってフィルタ処理される場合もあれば、侵入防止システム(IPS)で遮断される場合...
View ArticleInfo-Tech 社が Backup Exec を最も優れた製品に位置付け
「愚者は自らの経験に学ぶが、私は他者の経験に学ぶ方がいい」 - オットー・フォン・ビスマルク今年は多くの「学ぶ愚者」に会えることでしょう。新しいオペレーティングシステム、ハイパーバイザ、アプリケーションが発売されたとき、IT...
View ArticleHow to create a VMware Application Protection policy to back up the...
Hello Guys,This post guides us through How to create a VMware Application Protection policy to back up the SharePoint Application in a Virtual Machine.On the NetBackup Master ServerNetBackup Management...
View ArticleDesign Trends For 2013
It's a new year and with it comes new opportunities for design evolution on the web.Looking forward, there are three trends I think we can expect to see more of this year.1. Mobile no longer an...
View Article