Last week I posted a round up of various articles or posts that I’ve found interesting or exciting or something I wanted to save. One of the items that I posted here has since been solved so that’s pretty exciting.
This week was pretty light, not quite if it was due to me being busy or not finding a lot of information that made me excited. One of the posts will warrant a further blog entry here. So off to the round up…
- eWeek agrees with Symantec: Server Security is different than Laptop Security: I’m not sure why “Laptop Security” and “Server Security” is capitalized but whatever. The important thing here is the article from eWeek that talks about reasons why securing a server is different than securing a laptop. While it is pretty basic stuff, the article does bring up some good points. Interested in securing your critical systems (not just servers)? Look into Symantec Critical Systems Protection
- Search for a SSN inside DLP incidents: The poster is looking if there is a specific way to search for a particular social security number within a bunch of incidents. As one poster mentions this might be possible with exporting the XML of all of incidents and then dumping it into a query. Another person says you might be able to do it with IT Analytics. ANyone have any great ideas for this person?
- Standard Operating Procedure — Where to Start?: So this is a fascinating question to me, something that I’ve helped many many customers with. Where does one start with during an implementation of a DLP product? This forum post has spawned another blog post and I will link it, once I got it up and going (maybe the football games tomorrow will be boring and I’ll have a chance to be productive?).
- How does DLP work with Images?: This is an interesting question and address within another forum entry. Long story short I can fingerprint (IDM) a document or image to help track it down. However Symantec DLP does not track specific images (flesh tones, colors, etc) but some products attempt to do tis. Tracking down data stored in images is a complex tasks.
Well this was bit light on the round up, but some of the things I was looking at/reading on Symantec Connect. Would like some feedback if you find this helpful or even interesting.