<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2057386230213805635</id><updated>2024-08-31T06:05:12.013-07:00</updated><category term="e-mail security"/><category term="security news"/><category term="virus alert"/><category term="antivirus review"/><category term="backup"/><title type='text'>Endpoint Security</title><subtitle type='html'>News about a new generation of security products and services for managing risk and compliance in the three layers of the Enterprise Security framework.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>14</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-3474601659490296526</id><published>2007-10-26T03:12:00.001-07:00</published><updated>2007-10-26T03:12:32.483-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><category scheme="http://www.blogger.com/atom/ns#" term="security news"/><title type='text'>Marketers should strategize for data loss prevention.</title><summary type="text">As data loss continues to grow, prevention is a serious issue for companies, according to a new report by e-mail services firm Ironport Systems Inc.  In a new report titled &amp;#x201C;Data Loss Prevention Best Practices, Managing Sensitive Data in the Enterprise,&amp;#x201D; IronPort Systems, a business unit of Cisco, delineates best practices that companies can use to prevent leaks and to be compliant.</summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/3474601659490296526/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/3474601659490296526' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/3474601659490296526'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/3474601659490296526'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/marketers-should-strategize-for-data.html' title='Marketers should strategize for data loss prevention.'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-5215801818086316050</id><published>2007-10-22T23:01:00.001-07:00</published><updated>2007-10-22T23:01:57.067-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security news"/><title type='text'>BotNet - one day in the life.</title><summary type="text">A bot network tends to fluctuate such that the number of members of the network wax and wane over time. I base this understanding on my regular observation of modern botnets and the observations of my peers (please see pg. 41 of ISTR Volume X). In the past, IRC protocol-based botnets fell victim to an &amp;#x201C;Achilles Heel&amp;#x201D; situation if the single central server being used to control the </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/5215801818086316050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/5215801818086316050' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/5215801818086316050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/5215801818086316050'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/botnet-one-day-in-life.html' title='BotNet - one day in the life.'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-1356124479449185024</id><published>2007-10-18T23:36:00.001-07:00</published><updated>2007-10-18T23:36:59.030-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus review"/><category scheme="http://www.blogger.com/atom/ns#" term="security news"/><title type='text'>6 hot items on the hacker&amp;#39;s holiday shopping list</title><summary type="text">Here, according to Jackson and Schipka, are some the items likely to be in high demand by hackers shopping in this underground marketplace this coming holiday season:   1. Build A Storm Botnet: This new and uniquely crafted malware tool has been designed with the really high-end hacker in mind and is likely to be one of the hottest items this season, according to Jackson. For prices starting at $</summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/1356124479449185024/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/1356124479449185024' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/1356124479449185024'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/1356124479449185024'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/6-hot-items-on-hacker-holiday-shopping.html' title='6 hot items on the hacker&amp;#39;s holiday shopping list'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-7411645499254311346</id><published>2007-10-18T23:26:00.001-07:00</published><updated>2007-10-18T23:26:29.099-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="backup"/><title type='text'>Symantec ships next-gen SRM software</title><summary type="text">Symantec recently released the next generation of its Veritas CommandCentral storage resource management (SRM) software, with added support for both physical and virtual environments, advanced process automation and reporting features, and increased scalability.   Version 5.0 of Veritas CommandCentral enables administrators to peer into physical and virtual server and storage environments and </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/7411645499254311346/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/7411645499254311346' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/7411645499254311346'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/7411645499254311346'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/symantec-ships-next-gen-srm-software.html' title='Symantec ships next-gen SRM software'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-6890449208035154641</id><published>2007-10-18T23:18:00.001-07:00</published><updated>2007-10-18T23:18:04.472-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><category scheme="http://www.blogger.com/atom/ns#" term="virus alert"/><title type='text'>You’ve Got MP3 Mail! Be carefull!</title><summary type="text">McAfee Avert Labs has observed a new wave of pump-and-dump spam today that we believe to be originating from the Storm worm botnet. The spammed .mp3 attachments promote a company enjoying huge success in Canada and expecting amazing results in the USA.  These audio files are of very poor quality and one has to literally strain one&amp;#x2019;s ears to hear what&amp;#x2019;s being announced. The spammed .</summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/6890449208035154641/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/6890449208035154641' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/6890449208035154641'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/6890449208035154641'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/youve-got-mp3-mail-be-carefull.html' title='You’ve Got MP3 Mail! Be carefull!'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-8104778199224283497</id><published>2007-10-18T06:04:00.001-07:00</published><updated>2007-10-18T06:04:54.575-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="virus alert"/><title type='text'>New way for virus</title><summary type="text">My girlfriend recently bought an mp3 player through eBay. The slim 8GB player, dubbed &amp;#x201D;MP3 Player&amp;#x201C; by the no-name brand vendor, reminded me of some other well known player &amp;#x2013; I&amp;#x2026; I&amp;#x2026; I just can&amp;#x2019;t remember the name. But, since it was offered at half the price of an iPod, we though it wasn&amp;#x2019;t a bad deal and ordered it. Last week it was finally delivered </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/8104778199224283497/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/8104778199224283497' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/8104778199224283497'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/8104778199224283497'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/new-way-for-virus.html' title='New way for virus'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-867580370317844072</id><published>2007-10-12T03:04:00.003-07:00</published><updated>2007-10-12T03:59:31.993-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance. CONCLUSION</title><summary type="text">Email security is an ongoing endeavor. Because spam, viruses and fraud are a profitable business, the resources and tactics employed by those who generate this scourge are ever changing. As a result, your email security vendor needs to be committed to innovation. IronPort Systems leads the industry in technical innovation&amp;#x2014;with the largest research and development team in the industry and </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/867580370317844072/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/867580370317844072' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/867580370317844072'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/867580370317844072'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance_3048.html' title='5 steps for E-mail Security Assurance. CONCLUSION'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-6200147648701683969</id><published>2007-10-12T03:04:00.001-07:00</published><updated>2007-10-12T03:04:02.532-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance. Step 5: FIXING MAIL</title><summary type="text">Spam, viruses and fraudulent email have put a massive stress on email infrastructure. The root cause behind this scourge lies in the email protocol itself, SMTP. SMTP was developed in the late 1980&amp;#x2019;s when the Internet was primarily a tool used for technical people, such as university professors, to collaborate and share information over unreliable data links. To facilitate this, SMTP has </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/6200147648701683969/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/6200147648701683969' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/6200147648701683969'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/6200147648701683969'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance_1341.html' title='5 steps for E-mail Security Assurance. Step 5: FIXING MAIL'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-215233421948881307</id><published>2007-10-12T03:02:00.001-07:00</published><updated>2007-10-12T03:02:15.443-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance. Step 4: PROTECTING YOUR IDENTITY</title><summary type="text">There are two major email pitfalls that every IT manager needs to be aware of&amp;#x2014;bounce handling and outbound commercial mail.  Bounce handling refers to how a mail gateway responds to incoming mail that has an invalid address. There are two modes of response&amp;#x2014;conversational bounces and delayed bounces. A conversational bounce occurs during the SMTP conversation. This means that before </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/215233421948881307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/215233421948881307' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/215233421948881307'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/215233421948881307'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance_5088.html' title='5 steps for E-mail Security Assurance. Step 4: PROTECTING YOUR IDENTITY'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-5637428100649218886</id><published>2007-10-12T03:00:00.001-07:00</published><updated>2007-10-12T03:00:32.378-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance. Step 3: OUTBOUND SCANNING</title><summary type="text">There are two factors at work that are driving interest in outbound scanning &amp;#x2014;regulatory compliance and protection of intellectual property. Regulatory compliance can be put into three basic buckets&amp;#x2014;the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLB) and the Sarbanes-Oxley Act (SOX).  HIPAA requires that any entity dealing with personal </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/5637428100649218886/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/5637428100649218886' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/5637428100649218886'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/5637428100649218886'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance_7269.html' title='5 steps for E-mail Security Assurance. Step 3: OUTBOUND SCANNING'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-5968309149851189631</id><published>2007-10-12T02:58:00.001-07:00</published><updated>2007-10-12T02:58:39.791-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance. Step 2: STOPPING VIRUS</title><summary type="text">It may not be common knowledge, but spam and viruses are originated by the same people. 90 percent of the viruses in the past year have been designed to leave behind a small SMTP engine that is used to hijack an unsuspecting consumer PC and send out spam. So it&amp;#x2019;s ironic that the biggest sources of spam on the Internet might be the PC your mom or dad have connected to a cable modem, spewing</summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/5968309149851189631/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/5968309149851189631' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/5968309149851189631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/5968309149851189631'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance_8676.html' title='5 steps for E-mail Security Assurance. Step 2: STOPPING VIRUS'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-8279330089421540192</id><published>2007-10-12T02:54:00.001-07:00</published><updated>2007-10-12T02:59:14.968-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance. Step 1: STOPPING SPAM</title><summary type="text">The first generation of email security solutions used a simple approach to stopping spam&amp;#x2014;keyword analysis. These early filters would look for words typically found in spam (words like &amp;#x201C;free&amp;#x201D;, &amp;#x201C;Viagra&amp;#x201D;, or other more spicy language). The filters would typically use a scoring algorithm&amp;#x2014;if the word &amp;#x201C;free&amp;#x201D; occurs next to &amp;#x201C;Viagra&amp;#x201D; </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/8279330089421540192/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/8279330089421540192' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/8279330089421540192'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/8279330089421540192'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance_12.html' title='5 steps for E-mail Security Assurance. Step 1: STOPPING SPAM'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-7312350289689721742</id><published>2007-10-12T02:46:00.001-07:00</published><updated>2007-10-12T03:59:02.869-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="e-mail security"/><title type='text'>5 steps for E-mail Security Assurance - Introduction</title><summary type="text">It almost goes without saying that email is the most critical application in use by organizations large and small. Email is used in virtually every organization by at least some, if not all, employees&amp;#x2014;and its use is growing at a rapid pace. Organizations increasingly use email as the primary method for communicating with employees, managers, customers and prospects. Four out of five </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/7312350289689721742/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/7312350289689721742' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/7312350289689721742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/7312350289689721742'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/5-steps-for-e-mail-security-assurance.html' title='5 steps for E-mail Security Assurance - Introduction'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2057386230213805635.post-167438965538162273</id><published>2007-10-11T04:04:00.000-07:00</published><updated>2007-10-11T04:07:39.598-07:00</updated><title type='text'>Symantec Endpoint Security</title><summary type="text">Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.Key Features   * Seamlessly integrates essential technologies </summary><link rel='replies' type='application/atom+xml' href='http://antivirus-endpoint-security.blogspot.com/feeds/167438965538162273/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2057386230213805635/167438965538162273' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/167438965538162273'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2057386230213805635/posts/default/167438965538162273'/><link rel='alternate' type='text/html' href='http://antivirus-endpoint-security.blogspot.com/2007/10/symantec-endpoint-security.html' title='Symantec Endpoint Security'/><author><name>Mesteru Manole</name><uri>http://www.blogger.com/profile/06539615115109640565</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>