How To Create a Single or Multiple GUP
How To Create a GUPFirst Installed SEP client on that machine which you want to create as a GUP. and then follow the below mention steps.1. Login in to SEPM Console.2. Click on Policy.3. Then Click on...
View Article#Spotthetick to win a £50 Amazon voucher
This Monday, 11 February 2013, we will be giving you the chance to win £50 in Amazon vouchers each week just by Tweeting us the URL of a site where you have spotted the Norton™ Secured Seal. The...
View Article5 Weeks in.
A lot of questions for Altiris support today. The product is piloting very well to this point with the exception being the Deployment Solutions.The amount of issues with the product, the oddness of the...
View ArticleSymantec at the Mobile World Congress 2013 in Barcelona
Symantec at Mobile World Congress 2013 in Barcelona Symantec’s theme at the upcoming MWC 2013 in Barcelona is ‘Mobility without vulnerability’.For Communication Service Providers we will...
View ArticleSymantec™ Validation and ID Protection Service
Securing access to networks and applications.Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its...
View ArticleSymantec Secures 27 Honors from Redmond Magazine
Redmond Magazine recently announced the winners of its 2013 Reader’s Choice “Best of the Best” Awards and Symantec came out on top, winning the highest number of awards for a single company this year....
View ArticleYou Might Be an APT Victim if… - Part 3
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities: 1)Gaps in System and Security Logs; 2)...
View ArticlePhishing: The Easy Way to Compromise Twitter Accounts
Last week, Twitter announced that the details of around 250,000 of its users may have been compromised before it discovered and stopped an attack on their network. There is not much you can do when...
View ArticleDeep down under the hood
Great call today, Altiris support is like a box of chocolate, unless you are nice to some people and they can get you connected with the right people.Chatted for a while with Thomas Baird today, he's...
View Articleフィッシング: Twitter アカウントへの不正アクセスの手口
先週 Twitter 社は、同社のネットワークが攻撃を受け、攻撃はすぐに止めたものの、それまでの間に約 250,000...
View ArticleIs Exchange Journaling insecure?
Sounds strange doesn't it? Exchange Journaling, the process used by thousands of Exchange customers all over the world to ensure that have a defensible and reliable eDiscovery position, has been...
View ArticleMoney Transfer Spam Campaign with HTML Attachment
Phishers love to arouse curiosity and/or fear in the user’s mind and this stimulus can compel people to set aside all caution as well as any safety measures they might have in place to avoid such...
View ArticleCyber Threats Increase around Valentine’s Day
Most people are eagerly waiting for Valentine's Day. The day is an opportunity to spread affection and excitement amongst loved ones by exchanging gifts. Last year we observed prominent spam attacks...
View ArticlePhishing – La manera más fácil de comprometer las cuentas de Twitter
La semana pasada, Twitter anunció que la información de alrededor de 250,000 usuarios podría haberse comprometido previo a que descubriera y detuviera un ataque a su red. Es poco lo que se puede hacer...
View ArticleCustomer Success: Kwizda Holdings GmbH Selects Altiris to Reduce Costs &...
Kwizda, a leading Austrian pharmaceutical company, needed to streamline management and lower costs associated with managing some 900 clients and virtual servers. To further complicate the issue, the...
View ArticleAdobe Zero-day Used in LadyBoyle Attack
Yesterday, Adobe released an out of cycle patch that fixed two zero-day vulnerabilities (CVE-2013-0633, CVE-2013-0634) for Adobe Flash Player 11.5.502.146 and earlier versions for both Windows and...
View ArticleHomework for the weekend.
Sorted a lot of items today, most discovery and not fixes.Discovery of a lot more issues that is. All DS and imaging related. Here are some of the crazy scenarios.1. Build a machine with the predefined...
View ArticleMalvertising and Dynamic DNS: A Never Ending Story
Contributor: John HarrisonSymantec has been tracking a large malvertising campaign for over 5 months now. The campaign is still active and uses Dynamic Domain Name System (DDNS) to prevent itself from...
View ArticleHow Steve Jobs Influenced the Modern World of Digital Design
If you are a design professional, chances are one of the Apple computers was where you first learned your trade. You would also be somewhat familiar with one of the original men behind the design of...
View ArticleTroubleshooting Articles for Repairing the Corrupted Definition
Hi Friends,In this blog i have added some Troubleshooting Articles which can help to Repairing the Corrupted Definition How to clear corrupt Virus Definitions from...
View Article