cancel
Showing results for 
Search instead for 
Did you mean: 
North America
cancel
Showing results for 
Search instead for 
Did you mean: 

Discussion Posts

Integration CCS with DLP

Hi!! I need integrate Symantec CCS with DLP, i try do connection between this two product however i can't do the connection and appears the next issue: Connection to the Symantec Data Loss Prevention Enforce Server failed. Error in deserializing body...

Resolved! attack

Hello The whole world is saying today symantec was attacked by anonymous group, is this true? Someone could give us news even if it actually happened? should say, do not you think?

StevenN by Level 3
  • 1550 Views
  • 5 replies
  • 0 kudos

Monitoring machines

Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?  Would not it be nice to send this log to the administrator so that it has real science of what ...

Resolved! svchost.exe

There are some method to identify and fix svchost exe problems?

StevenN by Level 3
  • 1140 Views
  • 5 replies
  • 1 kudos

Forum discussions

Dear, good day. Some situations created for the forum discussions were not disclosed And is marked in red someone can tell me why? hugs

Risks of fraud power increase in business

The risks of fraud in computer security or enterprise networks have grown considerably in Brazil and worldwide. Essas são algumas das conclusões de um estudo realizado pela Deloitte intitulado “Risk Intelligent governance in the age of cyber threats”...

vulnerability

The Microso ft Windows users warned about possible attacks "man-in-the-middle" capable of stealing passwords from some wireless networks and VPNs (Virtual Private Networks).  However, the company will not release an update to resolve the problem.  Th...

Resolved! Phrases that scare security professionals

Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A child with chocolate smeared shirt says, categorically: "It was not me." Or the phone ...

IT security policies need to change

IT security policies need to change Mobility, cloud and advancement of social networks are becoming obsolete the traditional rules, say industry leaders IT and information security managers will not be able to directly control or adequately protect ...

Resolved! I was invaded, who's to blame?

This paper presents the thoughtful side of some teams after serious mistakes made by those who, after hiring some solutions in order to relax a little more concerned for their jobs, in order to relax so much that tend to change as the only solution c...

Resolved! Serious Error

Dear, good morning. I would like to make clear in this discussion, the importance that we give the integrity of our data, in particular our emails. We constantly see people everywhere reporting infections on their desktops and applications, but I do ...

How to update our vendor account for Symantec

Hi,   Our company has been on the Symantec vendors list for several years now. We recently changed our company name and I would like to know who to get in touch with at Symantec to update our files and continue to provide services to Symantec.   Than...

Labels