This short video discusses how Symantec Control Compliance Suite 11.5 can help you automate security and compliance assessments based on business criticality. For additional information on Symantec...
This short video discusses how Symantec Control Compliance Suite 11.5 can help reduce the duplication of effort many organizations struggle with when trying to comply with multiple mandates. Contro...
This short video provides a quick overview of Symantec Control Compliance Suite 11.5 covering such topics as: • Asset auto discovery • Automating security assessments • Collecting and normalizing d...
This short video discusses how Symantec Control Compliance Suite 11.5 can assess the effectiveness of your organization’s procedural controls. For additional information on Symantec Control Complia...
This short video discusses how Symantec Control Compliance Suite 11.5 can help you perform custom assessments based on your organization’s requirements such as the role of the asset or mandate requ...
This short video discusses how Symantec Control Compliance Suite 11.5 can help transform your IT risk into business-relevant metrics that can be shared with key stakeholders to drive awareness, acc...
This short video discusses how Symantec Control Compliance Suite 11.5 can help you automate many of the tasks associated with the vendor risk management process, including evidence collection, evid...
This short video discusses how Symantec Control Compliance Suite 11.5 can help you bring in data from multiple tool sets for a consolidated view of your security, risk, and compliance posture.
This short video discusses how Symantec Control Compliance Suite 11.5 can help you create and manage policies according to technical and procedural controls, mandates, and your organization’s inter...
This short video discusses how Symantec Control Compliance Suite 11.5 can assess your organization for known security threats. For additional information on Symantec Control Compliance Suite, go to...
This video provides a technical overview of the software license compliance and software asset management features found in Symantec IT Management Suite 8.0 including enhancements and improvements ...
This video provides a technical overview of the Device based software license tracking features found in Symantec IT Management Suite 8.0 including enhancements and improvements in the following ar...
This video provides a technical overview of the hardware based software license tracking features found in Symantec IT Management Suite 8.0 including enhancements and improvements in the following ...
This video provides a technical overview of the User based software license tracking features found in Symantec IT Management Suite 8.0 product including enhancements and improvements in the follow...
This technical overview video will provide you with step by step guidance on the installation and configuration of a Cloud Enabled Management infrastructure found within the Symantec Management Pla...
This technical overview video will provide you with step by step guidance on the planning, installation and configuration of a Cloud Enabled Management infrastructure found within the Symantec Mana...
This technical overview video will provide you with an introduction to the features and technology behind the Cloud Enabled Management feature that are embedded within the Symantec Management Platf...
This technical overview video will provide you with the architectural guidance to further understand the components, topology and specifications of a sound IT Management Suite 7.6 implementation.
This technical overview video will provide a summary of all of the enhancements made to the Cloud Enabled Management feature found in the 7.6 release of the Symantec Management Platform.
This technical overview video will provide you with a summary of the technical strengths of the solutions and features found in IT Management Suite 7.6.
This technical overview video will provide you with guidance on the prerequisites and preparatory steps to be taken before the implementation of the Cloud Enabled Management features within the Sym...
In this module we will start to look at Whole Disk Encryption. It is very important that administrators know which options are available to limit or empower the users.
In this lesson, we discuss how PGP Desktop interacts with PGP Universal Server. Plus we cover the desktop settings stored in the Messaging tab of a consumer policy and other messaging features for ...
In this lesson, you learn how to explain default mail processing, define conditions, actions and key searches, describe the key lookup process and how to create custom chains and rules.
A basic understanding of Cluster functionality is necessary for administrators who will need to do deployments of the encryption products which will require multiple Universal Servers.
This lesson defines and discusses the importance of directory synchronization, which is the method by which a PGP Universal Server can take advantage of your existing LDAP infrastructure to create ...
In this lesson, you learn how to recognize the use and purpose of Learn mode and cover the configuration of the lower level mail flow on the Universal Server.
In this module you learn about early cryptography along with many terms and definitions required to understand modern cryptography. We also look at different encryption methods and standards.
This lesson looks at the various PGP Encryption products available. Including PGP Universal Server, PGP Desktop, PGP Command line, and the PGP Mobile products.
In this module, you learn how to prepare for an installation of PGP Universal Server. This module also introduces PGP Universal Server administrative user interfaces.
In this lesson, you learn how to use the three different types of enrollment available for users. Enrollment is designed to allow the administrator to choose a method which best fits within the org...
This demonstration steps through some of the configuration tasks associated with configuring PGP desktop to utilize net share, virtual disk, and zip features.
This demonstration steps through some of the configuration tasks associated with clustering two Universal Servers. In this example one domain is representing a United States domain and another doma...
This demonstration steps through some of the configuration tasks associated with changing consumer policy options, enabling silent enrollment, download and install of a desktop client.
In this lesson, you learn how to understand differences between internal and external users and manage the options available when you do not find a key for recipients.