Supporting Innovative Research in Academia – Symantec Research Labs Graduate...
By Darren Shou, Director of Symantec Research LabsDid you know that Symantec supports and funds innovative research that occurs outside of a Symantec office in an academic setting? We’ve been doing...
View ArticlePlease Leave Your Hat On
Recently, we wrote about creepware and how people use it to spy on unsuspecting victims through webcams. As the name implies, this is really creepy. Unfortunately, there are other similar threats on...
View ArticleNuts and bolts in NetBackup for VMware: What is new in NetBackup 7.6?
This blog highlights the new features in NetBackup for VMware to accelerate your journey to Software Defined Data Centers.
View ArticleHotfix 2 for the SMP 7.5 released today!
A new Symantec pl xml was released to Solution Sam and it contains the Hotfix 2 for the Symantec Management Platform 7.5.Here are the file details:File name = Symantec_v2.pl.xmlMD5 hash...
View ArticleVertical Password Guessing Attacks Part I
In our last blog series we explored horizontal password guessing attacks. Check out Horizontal Password Guessing Attacks Part I and Part II in case you missed them. This time we'll test our web...
View ArticleMichigan Endpoint Management User Group Meeting?
Does anyone know who does the scheduling for the Michigan Endpoint Management User Group meeting? I find these meetings valuable and want to assume responsibility for managing them and getting support...
View ArticleSymantec releases version 7.1.4 of the Clearwell eDiscovery Platform
This article highlights the audio discovery capabilities included in version 7.1.4 of the Clearwell eDiscovery Platform.
View Article引き続き Web カメラには警戒を
Web カメラを通じて無防備な被害者を監視するクリープウェアについては、先日のブログでお伝えしました。名前が示すとおり、その性質は実に厄介です。残念ながら、インターネット上には類似の脅威がほかにも存在します。今年大きく蔓延しているもうひとつの詐欺行為は、Web カメラによる脅迫です。こちらの場合、詐欺師は Web...
View ArticleImportant changes to SSL certificates on intranets: what you need to know
If you use SSL certificates on intranet sites with internal server names, they may not work from 1 November 2015. For companies with complex infrastructures, the change may be challenging but now is...
View ArticleSymantec is an 8-time Leader in the Gartner Magic Quadrant for Data Loss...
Symantec Data Loss Prevention (DLP), a Leader in the Gartner Magic Quadrant for Content-Aware DLP, helps protect companies from malicious insiders and well-meaning employees.
View ArticleResolved: Some Groups Temporarily Missing from Connect
Edited: This problem has now been resolved. There is currently a known issue on Connect that is causing some groups to not appear on the site. We believe that we have isolated the problem and are...
View ArticleSolving The "Bigger Data" Challenge
Information is – slowly – moving outside the database. And it’s everywhere. Businesses want to get their hands on all the data that really matters, wherever it resides, because that is the strategy...
View ArticleSymantec VIP Update: Enhanced Self Service Portal and VIP Manager
Symantec would like to announce an update of the Validation and ID Protection Service (VIP), with enhancements for VIP Self Service Portal and VIP Manager.The VIP Self Service Portal has been...
View ArticleSymantec Managed PKI Service v8.10 Release
Symantec would like to announce an update of the Managed PKI Service, with enhancements for PKI Manager and PKI Client.The PKI Manager Dashboard now displays certificate usage by type, allowing...
View ArticleCustom SQL query for ASA DB (OpsCenter) to generate Monthly Success rate
Thus we were able to snoop the query and modify as per requirement. Connected to ASA DB and ran the query. The output was then processed to produce reportScriptsSample Report
View ArticleTask Scheduling in Enterprise Vault
When setting up new tasks in Enterprise Vault, the default for each task is to use the 'site schedule'. My question today is whether anyone uses this site schedule? Let's discuss... Here is the site...
View ArticleTurning Business Continuity into a Competitive Advantage
The pace of technological change and its complexity is challenging traditional business continuity paradigms. What was once considered a ‘Best Practice’ in Business Continuity (BC) no longer serves...
View Article