ITS Coffee Talks: ITS Partners' Discuss The Heartbleed Vulnerability SE01EP04
It’s the bug that continues to make global headlines over a month after its discovery. The Heartbleed vulnerability in OpenSSL has been called “the biggest fault in internet security history”, but what...
View ArticleSymantec Endpoint Protection: Custom Drive Letter Scanning
Scanning by drives is easy. Open the SEP client, create a new client scan, and set the drive letter. Then, just do this for each and every machine in your environment. Or, check out this demo from...
View ArticleSymantec Data Loss Prevention: Triggering Endpoint Response Rules
There's many ways for confidential data to be lost on your endpoints. Whether a malicious user gains access to a database of social security numbers, or your employees simply want to take their work...
View ArticleWho Really Owns Your Organization's Data? Symantec Insight and DLP.
ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information...
View ArticleInstalling CCSVM on Kali Linux
This video will demonstrate you how to install Symantec Control Compliance Suite Vulnerability Manager on Kali Linux.Video Upload: kali installation.mp4Vendor Specific Configuration 3839149395001 Public
View ArticleContextual Access... The Next Step Forward
Traditional IT Security & Access Management is based on a static definition of who the user is. But business is changing. The office is the home office, the coffee shop or the client site. The...
View ArticleWhat’s new in DLP version 12.5: Using application monitoring for Google Chrome.
The application monitoring feature in Symantec Data Loss Prevention enables you to monitor CD and DVD burning, instant messaging, email, and HTTP and HTTPS applications that can potentially leak...
View ArticleWhat’s new in DLP version 12.5: Agent health
During this overview I will be discussing agent health features new in Symantec Data Loss Prevention version 12.5.Video Upload: DLP_12.5_AgentHealth_10-28-14.mp4Vendor Specific Configuration...
View ArticleHIPAA Compliance... What to know and how to get there
Regardless of the size of the organization, if you handle Personal Health Information (PHI) you have to follow the rules of HIPAA. This can be a daunting exercise of weeding through the various...
View ArticleData Loss Prevention 12.5 Endpoint Prevent Demo
In this video, we demonstrate some features of the Endpoint Prevent module within the DLP Suite.Items covered:USB blockingcopy to clipboard blockingcopy to local Dropbox client, blocking the...
View Article