Norton Internet Security 2012 final version
Sep 8, 2011On September 7, Symantec launched Norton AntiVirus and Norton Internet Security 2012, which are designed to improve on their already industry-leading benchmarks for protection and performance, while enhancing the overall user experience.
Key technologies of Norton Internet Security 2012:
- Online identity protection
- Antivirus
- Antispyware
- Parental controls management
- Social network protection
- Browser protection
- Phishing protection
- Smart firewall
- Network mapping and monitoring
- Antispam
- Worm protection
- Rootkit protection
Norton Performance & Protection challenge
Mar 19, 2011Norton Internet Security delivers fast and light online threat protection. It guards your PC, network, online activities, and your identity with innovative detection technologies optimized to combat today’s aggressive, rapid-fire attacks. Norton Internet Security makes online shopping, banking, and browsing safer and more convenient than ever.
The improved Norton Protection System features multi-layered security technologies. They work together to provide the comprehensive protection that detects and removes network security threats before they can harm your PC. The Norton Protection System stops online identity theft, viruses, hackers, bots, spyware, Trojan horses, and more without slowing you down or getting in your way.
Parental control
Mar 14, 2011Parental control, also known as URL Filtering or web filtering software, is a term for software designed and optimized for controlling what content is permitted to children, especially when it is used to restrict material delivered over the Web. As rule, Parental control determines what content will be available for children in accordance with restrictions applied by a parent and helps parents to monitor the Internet activities of their children.
The motive is often to prevent children from viewing harmful Web content like phonographic, violation, drug, gambling and more. Some Parental control software includes time control functions that empowers parents to set the amount of time that child may spend accessing the Internet or playing games or other computer activities.
Security tips to keep you computer protected online
Jan 3, 2011Read about top 10 security tips to keep you computer protected online and learn how to secure your PC from security threats. Scan emails, patch and upgrade security software, backup computer, avoid spam and use latest protection software from Norton.
Network security threats
Dec 14, 2010As you probably know, the main objective of security software is to protect and ensure the safety of information, computer systems or computer networks from theft, vandalism, damage, loss and other potential hazards. Of course, security software is not the only solution to protect a computer system, but in my opinion, namely security software plays a crucial role in securing and maintaining the confidentiality of personal computers.
I think the problem is that unlike the corporate computers, personal computers are not adequately protected against Internet threats, since not all users are good professionals in the field of information security, often ignored the rules of computer security and many other security flaws that are not present in corporate networks. And if, in most instances for corporate computers the main threat are insiders, then for personal computers — Network security threats.
As a rule, to protect personal computer against Network threats helps security software, such as antivirus, anti-spam, firewall, anti-spyware and others — as multi-application security suite or standalone software. And despite the fact that this class of programs provides a malware, spyware, phishing, spam and vulnerability protection, they cannot protect against these threats if the user does not comply with the rules of computer security and ignores the recommendations of experts.
Black Hat 2010: Security industry best practices
Aug 14, 2010Following an industry conference, I find it a good practice for me to reflect back on what I learned and observed and see how I can apply it to my current work. At the conference there is so much to learn and take in, so I find it helps to let it all marinate for a bit of time and then I can start to uncover the new learning once I’m back at my desk and away from the conference buzz. It’s now been nearly two weeks since BlackHat wrapped up and these are the topics and observations from the conference that have been swilling around in my head. I hope to explore these thoughts more with my industry colleagues and find my way to contribute to improving security industry best practices.
Black Hat
The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. The environment is strictly vendor-neutral and focused on the sharing of practical insights and timely, actionable knowledge. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape.
In addition to the large number of short, topical presentations in the Briefings, Black Hat also provides hands-on, high-intensity, multi-day Trainings. The Training sessions are provided by some of the most respected experts in the world and many also provide formal certifications to qualifying attendees. Arrangements can also be made to bring Black Hat’s trainers to your location for private and customized training.
View the device details
Jun 11, 2010The Network Security Map lets you view the details of the computers that you remotely monitor. You can view the following details:
- The configuration status of your protection features, such as Auto-Protect, Intrusion Prevention, and Email Scanning
- The configuration status of your definition updates, such as Automatic LiveUpdate and Pulse Updates
- The version number of your Norton product
- The subscription status of your Norton product
- The configuration status of your transaction security, such as Identity Safe and Antiphishing
View the status of your wireless network
You can view the status of your wireless network in the Network Security Map window. The Network Security Map displays the status of your wireless network as secure or not secure. A secure network requires a strong wireless encryption. If your wireless network is not secure, you can turn on encryption on your wireless router.
Remove devices from the Network Security Map
The Network Security Map window lists the devices that are connected to your network. You can remove a device or a computer from the Network Security Map. You can purge all devices from the Network Map and create a new list of devices.
For example, you can purge all the devices that were present in your previous network before you connect to a new network. Ensure that you disable Remote Monitoring before you purge the Network Map. Norton Internet Security cannot purge the Network Map when the Remote Monitoring is turned on. Also, ensure that you close the Network Security Map window before you purge the Network Map. You cannot purge the Network Map when the Network Security Map window is open.
Change the trust level for your network and devices
Jun 10, 2010The trust level determines the default level of access that devices on your network have to your computer. Any device on your network that is not explicitly Trusted or Restricted uses the trust level of your network. The initial network trust level is set based on the configuration of your computer.
- The computer should not have a public IP address.
Your computer does not have a public IP address if it is not directly connected to the Internet. - The computer should be connected to a LAN through a secure connection.
- The network category should be private in Windows Vista.
- When the computer on the network has one or more folders or printers that are shared
- When the computer is Media Center compatible (for example, if you have Windows XP Media Center Edition, Windows Vista Home Premium, Windows Vista Ultimate, or Windows 7)
June State of Spam & Phishing Podcast
About podcast:
Eric Park and Deaddin Edris from Symantec discuss the June State of Spam & Phishing report in this monthly podcast series. Topics include the volume of spam seen by Symantec in the previous month, the latest spam trends and techniques, and tips on how to avoid spam messages. The State of Spam & Phishing report leverages security data from the Symantec Global Intelligence Network to keep organizations and consumers informed of the latest threats to their messaging infrastructure.
Edit network details
You can view the details and change the name of your network in the Edit Network Details window.
Edit device details
You can change the name and category of a device that is available on the Network Security Map. You can select the categories such as Generic Device, Laptop, Media Device, or Game Console.
You cannot change the category of the device that you added manually. By default, Norton Internet Security displays the category of the manually added device as USER DEFINED.
The Network Security Map window displays different icons, depending on the category that you select. Icons help you to identify the devices that are listed in the Network Map.
Find IP address
You can find a computer's IP address in various ways. On Windows 2000/XP, Windows Vista, and Windows 7 computers, you can use Ipconfig to find the IP address of a computer.
Ipconfig reports the IP address of its local computer only. You must run this program on the computer that you want to identify.
Add a device to the Network Security Map
Jun 8, 2010You can manually add a computer or device to the Network Security Map.
- The name or description
- The IP address or physical address
Norton Internet Security adds to the Trust Control network all the devices that you manually add to Network Security Map. You can select the Trust Control network in the Network Details drop-down list to view the devices that you added. You can also edit the name of the device.
Turn off Remote Monitoring
Jun 5, 2010When you turn off Remote Monitoring, you stop remote monitoring of the computers that are connected to your network.
You can turn off Remote Monitoring for the following:
- All of the computers that you remotely monitor
- An individual computer that you remotely monitor
Set up Remote Monitoring
You can set up Remote Monitoring by allowing computers on your network to communicate with your computer.
View devices on the Network Security Map
Jun 3, 2010The Network Security Map window provides a pictorial representation of the devices on the network to which your computer is connected. You can view the details of each device before you set up Remote Monitoring.
The Network Security Map window also provides the security status of the following computers:
- The computer on which you view the remote monitoring status (MY PC)
- The computers that are remotely monitored
Network Security Map
A home network typically consists of the computers and other devices that share your Internet connection. The Network Security Map helps you view and manage your network.
After installation, Norton Internet Security automatically detects the devices that are connected to your network and lists them in the Network Security Map. You can view devices and customize the Network Security Map to remotely monitor the computers on which a Norton product is installed.