Keeping Your Data Safe with SSL
There's been plenty in the news recently regarding encryption and SSL – which has led some people to wonder how safe the technology really is. As the leader of Symantec's Trust Services Products &...
View ArticleRegister now for Webcast: Get your weekends back with NetBackup Appliances
Register now for a Webcast on Tuesday, Dec. 10 at 10:00am PST to learn how to get your weekends back with NetBackup Appliances!
View ArticleIt's Here...DataCane Official Video
Think you’ve seen it all? How about 35,000 lbs. of water... 100mph winds... 3 minutes. Check out DataCane.Can't see the video? See DataCane on YouTube.
View Articleハロー効果と、Mac、マルウェア、セキュリティについて企業が知っておくべきこと
iPod と iPhone によって作り出された「ハロー(後光、光背)」が、ビジネスユーザーに対する Mac の売上を引き上げています。これが、いわゆる「ハロー効果」です。筆者がこの現象に気付いたのは数年前のことでした。会議室のテーブルでも Mac を広げる姿が増え、あのシルバーの筐体と白く輝くリンゴのマークをたびたび目にするようになってきたからです。Apple 社の報告によると、2013 年の第...
View ArticleDove trovare versione di Java
Cos'è Java Java è un linguaggio di programmazione e una piattaforma di elaborazione sviluppati da Sun Microsystems nel 1995. Si tratta della tecnologia sulla quale si sviluppano i programmi più...
View ArticleQuick update....
I’d like to share two webinars with you that we delivered this weekThe first was Attack of the Cyber Spies a webinar delivered as part of BrightTALK’s Hackers Summit which you can access here.The...
View ArticleSustainability Spotlight - Peter Hancock Named Npower's Volunteer of the Year
In honor of International Volunteer Day this week we are featuring a “Sustainability Spotlight” series, highlighting employees across Symantec who incorporate aspects of corporate responsibility (CR)...
View ArticleCryptolocker Q&A: Menace of the Year
Cybercriminals are constantly looking for ways to evolve their malware. Evolution is the key for survival because antivirus research, analysis, countermeasures, and public awareness thwart the efficacy...
View ArticleEnterprise Vault .DB files, and their naming
The Enterprise Vault Vault Cache and Virtual Vault functionality has made a great impact to the end user experience that people have when working with archived emails in Outlook. Under the covers...
View ArticleCryptolocker に関する Q&A: 今年最大の脅威
サイバー犯罪者はいつでも、マルウェアを進化させる方法を探っています。ウイルス対策をめぐる研究や解析、対策が進み、ユーザー意識が向上したためマルウェアの威力が薄れ、拡散も鈍っていることから、進化が生存の鍵となっているからです。ランサムウェアは、この数年間でメディアに大きく取り上げられた結果、知らぬ間に犠牲になるユーザーが減り、その影響力や効果も半減するとともに、犯罪者にとって費用対効果も下がってきまし...
View Article'Cloud-enabled Management Whitepaper' is now published
Hi Everyone, Cloud-enabled Management (CEM) is a new feature that allows you to manage client computers outside the corporate network, even if you do not use a Virtual Private Network. CEM was first...
View ArticleSmartIO in Storage Foundation HA 6.1
The 6.1 release of Storage Foundation High Availability introduces SmartIO which enables customers to increase application performance and reduce storage costs while maintaining availability of data...
View ArticleHow to find the rules associated with Software Releases
The following query has the ability to list all Software Releases and their associated rules or just the rules associated with a specifc Software Release:SELECT rsr.Name AS [Software Release],rir.Name...
View ArticleCreepware - Who’s Watching You?
Some people stick a piece of tape over the webcam on their laptop, maybe you even do it yourself. Are they over cautious, paranoid, a little strange? Are you? Or is there reason behind this madness?...
View ArticleSymantec Once Again Recognized as Leader in LGBT Equality
By Pat Padilla and Gary Phillips, Co-Champions of SymPride. The Human Rights Campaign (HRC) announced yesterday that Symantec achieved a perfect score of 100 in its Corporate Equality Index (CEI) for...
View ArticleThe cloud orchestration wars - focus on the task at hand
Few areas of IT seem to be gaining as much attention at the moment as cloud orchestration, as represented by OpenStack and CloudStack, VMWare and the like. The debates in the blogosphere and on social...
View ArticleMicrosoft Patch Tuesday – December 2013
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing eleven bulletins covering a total of 24 vulnerabilities. Ten of this month's issues are rated...
View ArticleFinding Policy Information by Client (command-line scripting)
A not-so-simple program I wrote in perl that helps to generate policy information and historical run information together in one single-command output, so you can provide detailed information to the...
View Articleマイクロソフト月例パッチ(Microsoft Patch Tuesday)- 2013 年 12 月
今月のマイクロソフトパッチリリースブログをお届けします。今月は、24 件の脆弱性を対象として 11 個のセキュリティ情報がリリースされています。このうち 10...
View ArticleThree Reasons Why Items are Stuck in Pending Archive
In this article I'd like to give you a tip or two about why items sometimes just simply remaining in an 'archive pending' state. I'm sure you've all seen this from time to time in your environment, or...
View Article