Symantec Encryption: What's New?
In the past, it was fairly easy to keep corporate data protected by keeping it within an established perimeter—protected by established access controls and passwords. That model has been blown apart...
View ArticleAre You an Overconfident IT Manager?
Imagine you are newly married and you and your spouse are looking for new home to build and raise your family. You spend time pouring over real estate books, websites, and talking with your friends....
View ArticleDisaster Recovery Readiness: How prepared are you?
With natural disasters, such as Hurricane Sandy, many organizations are rethinking their disaster recovery readiness. To thwart impending disasters, Symantec and Intel jointly designed NetBackup...
View Articleランサムウェアの活動が活発化
昨年末近くに予測したとおり、今年に入ってランサムウェアの活動が活発化していることが確認されています。ランサムウェアによる恐喝詐欺は、初めて登場してから何年も経ちますが、ここ 2...
View ArticleQuick query to list inherited right (undue) after SP2 upgrades
I attended an upgrade for a customer installing MP1.1 on 4 servers in hierarchy (1 parent, 3 children). We had some minor problems when we got started but nothing major:2 servers (including the parent)...
View ArticleMalicious Spam Emails Target Nightclub Disaster in Santa Maria
Symantec Security Response has observed that spammers are distributing malicious emails that attempt to lure users into viewing a video of the incident that killed 233 people recently in a horrific...
View ArticleWHERE BIG DATA AND SECURITY ALIGN
There has been a data explosion within security teams, as organisations everywhere seek to increase their effectiveness in preventing breaches of defences through improved correlation and data sharing....
View ArticleBE usability session-participants wanted!
Hello Symantec customers. I am a usability engineer working in Backup Exec. I have new design concepts for a possible future release of BE that I would like your feedback on. In order to make products...
View ArticleCustomer Success Story: Fujian Mobile Reduces Storage, Increases Processing...
As Fujian Mobile in China rapidly grew from 2 million customers in 2003 to nearly 30 million today, the need for a secure, highly available, and efficient billing system became ever more important....
View ArticleGift of Trojan.Smoaler Delivered Through Fake FedEx Emails
Symantec Security Response is aware that fake FedEx emails have been circulating recently. The emails claim the user must print out a receipt by clicking on a link and then physically go to the nearest...
View ArticleFedEx 社を騙る電子メールを通じて届く Trojan.Smoaler のプレゼント
シマンテックセキュリティレスポンスは、最近 FedEx 社を騙る偽の電子メールが出回っていることを確認しました。この電子メールには、リンクをクリックして受領書を印刷し、それを最寄りの FedEx 社の事業所に持参して小包を受け取るようにという指示が書かれています。そんな小包はもちろん存在せず、リンクをクリックしても待っているのは PostalReceipt.zip というファイルだけです。その中に...
View ArticleSymantec Partner Technical Academy for VAD-led Partners - Reading(UK), 25th...
Thank you very much to all VAD-led Partners that attended the Symantec Partner Technical Academy on Friday the 25th of January. We received a lot of positive and constructive feedback from all of you,...
View ArticleAltiris 7.1 migration, Imaging and Software
This week, diving deeper in to the functional side of DS with some Windows 7 testing along with software deploying.So we all know the new DS is different, but I never knew it was going to be this...
View ArticleUpgrading to Enterprise Vault 10.0.3?
In order to see if an issue I currently have is still present with Enterprise Vault 10.0.3 I decided to take the plunge and upgrade a copy of one of my virtual environments to Enterprise Vault 10.0.3....
View ArticleCould a Circular Economy Change the World?
This year, I made it my New Year's resolution to adopt social media and all that it is.Time is, of course, always the enemy. This endeavor has taken some discipline, but it’s also given me clarity of...
View ArticleTask runs on client but NS displays ‘Failed’ status after a few hours
I had an issue where I would run a Task like 'Update Client Configuration', but the NS would show a ‘Failed’ status after a few hours. On the client, it would show 'Success - return code 0'. The...
View ArticleWhat do you want to do on social? Setting objectives for your social efforts
We all know that if you go shopping without a list—whether to Home Depot or the grocery store—you may come home with more than you planned on or worse, without something you needed. What’s more, your...
View ArticleBackdoor.Barkiofork Targets Aerospace and Defense Industry
Contributor: Joseph BinghamA few weeks ago, we observed a spear phishing campaign targeting groups in the aerospace and defense industry. We identified at least 12 different organizations targeted in...
View ArticleSymantec Statement Regarding New York Times Cyber Attack
As a follow-up to a story run by the New York Times on Wednesday, Jan. 30, 2013 announcing they had been the target of a cyber attack, Symantec (NASDAQ: SYMC) developed the following statement:...
View Article