Security Blog Posts

Making Your Security Investments Count
Blog

Making Your Security Investments Count

With experts predicting cybersecurity investments spending to increase again this year, one of the most frequent questions Conventus consultants field from customers is whether their organization should invest in new...
Read More
How To Safely Block Service Accounts with Symantec DCS
Blog

How To Safely Block Service Accounts with Symantec DCS

Why block specific users from being able to log on interactively into systems using Symantec’s Data Center Security Server (DCS) aka Critical System Protection (CSP)?   Answer: Service Accounts  ...
Read More
Symantec Endpoint Protection 14: Group Update Providers (GUP)
Blog Technology

Symantec Endpoint Protection 14: Group Update Providers (GUP)

The use of GUPs in your SEP environment can either be a useful tool or something that requires more management.   In this article we wanted to explore what a GUP...
Read More
Symantec DCS: Optimizing Security Performance from Day 1
Blog

Symantec DCS: Optimizing Security Performance from Day 1

Symantec Data Center Security: Advanced offers IT organizations an unparalleled means of securing the state and integrity of their Windows and UNIX servers and application environments, both within the physical...
Read More
Mitigating Ransomware Exposure in Healthcare
Blog

Mitigating Ransomware Exposure in Healthcare

The Office of Civil Rights, (OCR) has been dealing with much confusion in the healthcare arena as it pertains to the malware attack type of ransomware. This particular type of...
Read More
Proactive Protection for Critical Vulnerabilities in MySQL
Blog

Proactive Protection for Critical Vulnerabilities in MySQL

  Earlier this month security researcher David Golunski published CVE-2016-6662 for critical vulnerabilities in MySQL “which can allow attackers to (remotely) inject malicious settings into MySQL configuration files (my.cnf).” Oracle...
Read More
Security Analytics: The Importance of Context
Blog In The News

Security Analytics: The Importance of Context

  Our goal should always be to leverage data to drive metrics, use metrics to drive intelligence, and use intelligence to drive action…all while maintaining the context to ensure we’re...
Read More
Blog

Monitoring The Health of Your AntiVirus Using SOLVE

To maintain a secure environment, the health of the environment is extremely important.   Managing the health status of of your antivirus solution is one of the first lines of...
Read More
Blog

Visualize Symantec DCS Agent Metrics with SOLVE

Oftentimes the simplest use cases are often the most critical. One Symantec Data Center Server administrator at a Fortune 500 company needed the ability to easily filter information contained within...
Read More
Blog

Symantec Endpoint Security: CSP/DCS Vulnerabilities

Summary On 6/7/16, Symantec sent out a notification about security vulnerabilities found in their Symantec Critical System Protection and Data Center Security management and agents. These vulnerabilities could enable unauthorized...
Read More
Blog

STOP WME.exe Point of Sale Malware using Symantec CSP

What you need to know… The US-CERT Malware Analysis Report published 17 March, 2016 has provided specifics on a new piece of Malware which is circulating in wild.  This malware...
Read More
Blog

Conventus Announces New Releases of SOLVE and NorthStar

New Domain As we expand our marketing, we've renamed our domain to http://poweredbynorthstar.com. We are excited about some of the new products we will be debuting on the platform and...
Read More

Comments are closed.