Symantec

Displaying 41-80 of 149 results

  • Webcasts // Jan 2010

    Symantec's 2010 State of the Data Center Study

    Now in its third year, Symantec's 2010 State of the Data Center study is a yearly report that highlights trends regarding data centers in companies worldwide. Conducted by Applied Research, the 2010 survey is based on input from 1,780 data center managers in 26 countries in November 2009. For the...

    Provided By Symantec

  • Webcasts // Jan 2010

    Application Pack 1 for Storage Foundation & High Availability Solutions 5.1 SP1 for Windows

    The presenter of this webcast will discuss the new application support of the upcoming Application Pack 1 release. The primary focus will be enhanced quick recovery, availability and disaster recovery features provided by Veritas Storage Foundation HA for Windows for Exchange 2010 environments. In addition, the attendee will gain insight...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Medical Image Storage Dilemma: Why Hosted Archiving Makes Sense

    Secure storage capacity and lowering costs - do these seem like mutually exclusive propositions in the healthcare industry? Most healthcare organizations can't keep adding storage capacity to keep up with their growing medical image archive. Exponential growth in image size and volume translates into more servers, and yet space in...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec Protection Suite: Protect Against Risks to Your Infrastructure

    In this webcast, the presenter will discuss how Symantec Protection Suite can help the attendee protect their infrastructure from the endpoint to the gateway. The presenter will highlight the easy management of the technologies in the Protection Suite, and showcase how it can ensure systems and critical information is available...

    Provided By Symantec

  • Webcasts // Jan 2010

    A Glimpse Into the High Availability and Disaster Recovery Future

    As the data center evolves, IT managers are facing new High Availability and Disaster Recovery (HA/DR) challenges. IT organizations are continually being asked to protect an increasing number of mission critical applications with the same resources. To address these challenges, IT requires HA/DR solutions that automate processes, provide flexible architectures...

    Provided By Symantec

  • Webcasts // Jan 2010

    A New Guide to PCI: Proven Compliance Insights for the Payment Card Industry

    Regulation is the low bar for security, most companies want and should strive for more. According to the PCI Security Standards Council, PCI is "Good, basic security" but is not the end game. There are real world cases of companies that have achieved PCI compliance but still suffered from data...

    Provided By Symantec

  • Webcasts // Jan 2010

    Complement Your Backup Environment With First to Market VMware and Hyper-V Application Support

    Many organizations today are looking at, or have already adopted, virtualization for some of the immediate benefits it offers including server consolidation and flexible HA environments. But as one adopts virtualization - one will most likely experience new storage challenges and backup and recovery complexities. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Jan 2010

    Stop Buying Storage: Invest in Professional Services

    Storage managers need to find a way to take what they bought yesterday and get more return out of it today. With restrictions on capital spending and hiring freezes being commonplace, investment in a storage professional services engagement can free up wasted storage capacity and improve storage efficiency, avoiding major...

    Provided By Symantec

  • Webcasts // Jan 2010

    Data Loss During Downsizing: As Employees Leave, so Does Your Corporate Data

    Many employees are leaving their current positions, due to either job loss or to pursue other opportunities. Companies should be aware that these employees may well be walking off with sensitive or confidential data. This puts the company at risk for a potentially serious data breach. The theft of proprietary...

    Provided By Symantec

  • Webcasts // Jan 2010

    Why You Should Deduplicate Virtual Machines and Windows Applications at the Source

    The virtualization revolution continues to move through data centers, large and small. The ability to protect and manage the virtual world gets harder every day. Embracing a deduplication solution can give one back control. Deduplicating at the source will not only reduce the storage costs, but it can also free...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec Internet Security Threat Report Volume XV: Highlights and Key Trends

    The Internet threat landscape continues to change and increasingly complex and sophisticated attacks are targeting the organization's infrastructure and confidential information. This makes it even more important for the attendee to have access to global threat intelligence that can assist them in making informed decisions on how best to protect...

    Provided By Symantec

  • Webcasts // Jan 2010

    Next Gen Threat Protection: Keep Networks and Customers Safe With Integrated Real-Time Intelligence

    Service providers, large enterprises and social networks now face more security threats than ever. 42% of IT groups cite cyber risk as their top concern - greater than natural disasters, terrorism and traditional crime combined. Spam alone now accounts for 85% of all email traffic. And 3 out of 4...

    Provided By Symantec

  • Webcasts // Jan 2010

    Maximize MS-Exchange Performance, Scale, and Compliance With Archiving

    Information management is about protecting, managing and finding unstructured information - including information in email - wherever it goes. This webcast will focus on key problems in managing information within the Microsoft Exchange eco-system including keeping Exchange data volumes at predictable levels; gaining control and eliminating PST files; finding information...

    Provided By Symantec

  • Webcasts // Jan 2010

    Optimizing Your Storage Environment With Veritas Storage Foundation

    Organizations are constantly looking to drive automation and reduce storage hardware costs while improving access to data. The attendee of this webcast learns how Veritas Storage Foundation solves these key challenges by leveraging thin provisioning, thin reclamation, solid state drives and storage tiering. Attendees will also learn how these solutions...

    Provided By Symantec

  • Webcasts // Jan 2010

    Preparing for E-Discovery With Strategic Information Management

    The information management strategy which is prepared with considerable care can have great effect on the organizations capability to handle its information, and at the same time retrieve it in the event of legal action. In the demanding, and growing requests for the e-discovery, all the teams which are Legal,...

    Provided By Symantec

  • Webcasts // Jan 2010

    Protect Your Email With Symantec Brightmail Gateway 9.0

    This webcast covers information regarding, how to protect your email with the help of the latest release Symantec Bright mail Gateway 9.0. Symantec Bright mail Gateway is one of the latest effective as well as accurate real time antispams and antivirus protection application which delivers both inbound as well as...

    Provided By Symantec

  • Webcasts // Jan 2010

    Meeting the Challenges of Today's Targeted Attacks

    This webcast in particular deals with it security, and offers the attendee the information on what targeted attacks are, how the Hydraq attack worked to steal information from the world's biggest companies, and how to develop a security strategy that can help stop targeted attacks. The webcast also deals with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec NetBackup's Unique Integration With VMware vSphere 4

    If someone is a person who is responsible or interested in the protection of the various virtual machines, then this is the right webcast for them, and for those who are really interested in the virtual machines, and virtual technologies. The webcast offers the ways to identify the major five...

    Provided By Symantec

  • Webcasts // Jan 2010

    Whose Data Is It Anyway?

    How does one manage unstructured confidential data and prevent a breach? Unstructured data continues to grow at over 60% per year. Data security teams may have little or no visibility into where confidential data is stored, who is responsible for the data or who has access to that data. In...

    Provided By Symantec

  • Webcasts // Jan 2010

    How to Get Your SharePoint Growth Under Control and Prepare for SharePoint 2010

    If the person is looking into or already have SharePoint sites within the organization, optimizing storage resources should be top of mind. The attendee is likely enabling document versioning to enable better collaboration - but does he realize every new document version creates a whole new file in the SQL...

    Provided By Symantec

  • Webcasts // Jan 2010

    Redefining Endpoint Management With Symantec IT Management Suite 7.0

    Symantec IT Management Suite 7.0 reduces the cost and complexity of owning and managing corporate IT assets including desktops, laptops, and servers. View this webcast and discover what's new in Symantec IT Management Suite (formerly Altiris Total Management Suite), how ITMS automates common IT processes and increases service levels.

    Provided By Symantec

  • Webcasts // Jan 2010

    Driving Cost Out of the Data Center With Veritas Cluster File System and Veritas Cluster Server

    Looking for real life examples on how other customers are driving cost out of their datacenter? Learn how Cluster File System High Availability is being used to reduce or even eliminate downtime costs through its fast failover capabilities. In addition, find out how other customers now finding additional new and...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce Your Storage Footprint and Improve File Server Performance With Archiving

    Reduce the storage footprint and reclaim space on the file servers that is unnecessarily housing large, old and duplicate data. Has a person ever run an analysis to see how old the information is that one is constantly backing up and having to manage? Is one struggling with performance and...

    Provided By Symantec

  • Webcasts // Jan 2010

    The Smart Route to Windows 7

    As businesses review their upcoming migration to Windows 7, it is essential to review not only the migration tools but the entire IT infrastructure and areas in which efficiencies can be gained to make this a truly transformative event. Businesses should review their Windows 7 client security strategy to ensure...

    Provided By Symantec

  • Webcasts // Jan 2010

    Your Business Is at Risk. Protect It Completely

    What would happen to the business if one lost the customer data? If company records or intellectual property were stolen? It is estimated that 42% of small business customers have switched vendors because of the business's unreliable computing system. In this economy - when retaining every customer is key to...

    Provided By Symantec

  • Webcasts // Jan 2010

    Secure and Manage Your Data in Amazon's Cloud

    Moving all or part of the infrastructure to Amazon's Elastic Compute Cloud? Then one is also considering how to protect and manage the cloud storage online. This webcast gives answers around securing the information in the cloud. View now, have confidence in the cloud.

    Provided By Symantec

  • Webcasts // Jan 2010

    Information Governance in the Cloud

    Despite widespread interest in adopting cloud computing technologies, many organizations are "Flying blind" with respect to making them secure, potentially putting their operations, intellectual property and customer information at risk. Sponsored by Symantec, Ponemon Institute, a leading privacy and information management research firm, independently conducted a national study, Flying Blind...

    Provided By Symantec

  • Webcasts // Jan 2010

    Store Efficiently - Spend Less on Storage and Optimize What You Have

    Most organizations today are faced with the difficult challenge of managing explosive data growth. Adding to that challenge is the problem of poor storage utilization rates, which typically hover around 30-40% for most organizations. The end result is intense pressure on IT organizations to contain skyrocketing storage costs while dealing...

    Provided By Symantec

  • Webcasts // Jan 2010

    Top 10 Backup Mistakes in Virtual Environments? And How to Avoid Them!

    As enterprises embrace virtualization, their broader IT infrastructure is also shifting. One of the most significant areas of change is in how data and systems are protected. Common mistakes in data protection strategies for virtualized environments are costly and create business risks. Enterprises need to balance their backup strategies with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Ensuring 24 X 7 Data and Infrastructure Availability

    As businesses demand higher service levels and IT budgets remain flat, ensuring 24 x 7 data and infrastructure availability is not an easy task. Simply relying on people and manual recovery processes can be very risky in today's competitive business climate. Symantec addresses these issues with solutions that: Provide automatic...

    Provided By Symantec

  • Webcasts // Jan 2010

    Unified IT Security Management With Symantec Protection Center and Symantec Protection Suites

    Symantec Protection Center and Symantec Protection Suite introduce a new way organizations will realize the benefits of intelligent management and unified security solutions in today's complex IT infrastructures. Minimal insight into the threats the environment faces, slow responses to security incidents when they take place and a lack of automation...

    Provided By Symantec

  • Webcasts // Jan 2010

    Reduce the Cost and Complexity of Compliance

    Is the regulatory compliance program costly and time-consuming? Is one having trouble providing ongoing support for audits? Does one have the resources to keep up with ever-changing regulations and industry standards? What about the overall IT risk posture?. Does one know if all the IT assets are properly protected? Can...

    Provided By Symantec

  • Webcasts // Jan 2010

    Complete Protection Without Compromise

    One faces formidable challenges every day balancing the need for security and increased data protection with the flexibility demanded by the rest of the organization. Strategy can take a backseat while one concentrates on day-to-day firefighting. One thing a person shouldn't have to do is compromise the security and availability...

    Provided By Symantec

  • Webcasts // Jan 2010

    Effective Strategies for Domino Backup, Archiving, and Recovery

    Backup vs. Archiving? Recovery vs. Discovery? Which keeps the employees productive and which keeps the Legal department off one's back? In this webcast the presenter looks at backup, archiving, and recovery for the Domino environment. The presenter will discuss the business needs driving these areas as well as identify technical...

    Provided By Symantec

  • Webcasts // Jan 2010

    Carve Out IT Budget Through Better Software Management

    Software is one of the more expensive components of an IT budget. Keeping track of who has the software, who pays for it, and who uses it can become very complex. Does one have to prepare for an upcoming software vendor audit? Is it the time to renew expensive software?...

    Provided By Symantec

  • Webcasts // Jan 2010

    Is Social Networking Foiling Your Security Practice?

    This educational webcast teaches how the attendee can "Go social" without going sleepless. Social networking is rapidly evolving into one of the biggest threats to data security out there today. But the reality is, this medium is also a great way for the employees to collaborate and communicate. The challenge...

    Provided By Symantec

  • Webcasts // Jan 2010

    Backing Up VMware: Benchmarks and Best Practices With NetBackup and Cisco

    VMware's new vStorage API for Data Protection has revolutionized virtual machine protection, however, to fully realize these capabilities one needs the proper tools. Symantec and Cisco have teamed up to show how using Symantec NetBackup 7's native integration with the vStorage API and Cisco's Unified Computing System (UCS) architecture can...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec Endpoint Protection

    In this webcast, the presenter will discuss the latest release of Symantec Endpoint Protection (SEP). This release includes new features in such areas as central management, virtualization support, new OS, and new recovery options. If one is responsible for managing or supporting SEP or want to stay on top of...

    Provided By Symantec

  • Webcasts // Jan 2010

    Overview on the Latest Deduplication Solution by Symantec, NetBackup 5000

    Symantec understands the shifting needs of the data center and has now launched a new deduplication appliance, NetBackup 5000, as an additional option for customers to leverage with their backup strategy and to help maintain information growth within their environment. NetBackup 5000 simplifies the deployment of deduplication to existing NetBackup...

    Provided By Symantec

  • Webcasts // Dec 2009

    Automate Your Security Awareness Training

    Research shows that the single most important cause of data breaches is the inadvertent violation of basic information security precautions by well-meaning employees. Whether it is storing confidential data unencrypted on a removable device that may be lost or stolen - or simply sharing proprietary information in a crowded elevator...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Nov 2009

    Overview on SP1 Release for Storage Foundation and High Availability for Windows 5.1

    Storage Foundation and High Availability for Windows 5.1 will be releasing Service Pack 1 (SP1) in November. This SP1 release includes an eye-popping list of extended features and additional functionality that enables this product to maintain its competitive edge in the storage management and availability space for the Windows environment....

    Provided By Symantec

  • Webcasts // Nov 2009

    Get the Most Return From Your Backup Exec Investment

    Anyone on an older version of Backup Exec may be missing out on valuable backup and recovery advantages achieved by simply upgrading. Recent internal performance testing proves that by simply upgrading to the latest version of Backup Exec 12.5, one can experience a 50-100% increase in backup performance. Symantec Backup...

    Provided By Symantec

  • Webcasts // Nov 2009

    Mind the Gap: What 3rd Party Archiving Brings to Your Exchange Environment

    There are a lot of messages, storage, backups, policies, and people to manage just to maintain the current state of email and make sure it's accessible to those who need it, when they need it. Many organizations need more than the archiving functionality that will be available within Exchange 2010....

    Provided By Symantec

  • Webcasts // Nov 2009

    Windows Virtualization - Crossing the Data Protection Divide With NetBackup

    As more companies move to virtualization to control spiraling IT costs, virtual machines are taking on more mission-critical workloads as Microsoft Exchange, SQL, SharePoint, and Active Directory. Protecting such application, data, and storage-intensive environments takes on a whole new set of complexities, and typically requires a whole new set of...

    Provided By Symantec

  • Webcasts // Nov 2009

    Five Things You Wish You Knew Before You Virtualized

    The reality of deploying virtualization is that it can also increase the complexity and cost of managing the applications and servers. As Virtual Machines (VMs) proliferate - storage growth, data protection, and application and data recovery are just a few detours that can impact the business' bottom line. Without an...

    Provided By Symantec

  • Webcasts // Oct 2009

    Why Breaches Happen... and What to Do About It

    For companies with critical information assets such as customer data, intellectual property and proprietary corporate data, the risk of a data breach is now higher than ever before. In order to reduce this risk, it is essential to understand why and how data breaches occur. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Oct 2009

    Announcing the Backup Exec 2010 Early Adopter Program - Dedupe Everywhere!

    Interested in learning more about the benefits of data deduplication? The next major release of Backup Exec coming later this year brings industry recognized deduplication technology (using NetBackup PureDisk technology). The attendee of this webcast will learn how to enroll in the upcoming early adopter program and the data reduction...

    Provided By Symantec

  • Webcasts // Oct 2009

    Symantec FileStore: Building a Foundation for Cloud Storage

    Cloud storage has the potential to change the economic cost curve for computer storage delivery. Lower product costs and reduced administrative effort make Cloud Storage attractive for both public cloud providers and enterprises considering a private cloud. Symantec FileStore delivers the benefits of Cloud, starting with a bridge from current...

    Provided By Symantec

  • Webcasts // Oct 2009

    Archiving and Information Management for Microsoft Exchange 2010

    As organizations eagerly anticipate the release of Microsoft Exchange 2010, experts from Symantec and Microsoft come together to discuss Exchange 2010 and key considerations for archiving Exchange and other Microsoft applications. Attend this webcast to learn how to make job easier around managing Exchange, storage, and E-Discovery matters.

    Provided By Symantec

  • Webcasts // Oct 2009

    High Availability and Disaster Recovery for Virtual Server Environments

    Companies are utilizing server virtualization to reduce hardware costs and increase agility, however deploying mission-critical applications in virtual machines brings new challenges. The attendee will gain a deeper understanding of the challenges to true high availability and some answers on how to achieve it.

    Provided By Symantec

  • Webcasts // Oct 2009

    Simplify, Automate, and Reduce the Cost of IT Asset Disposal With TechTurn's Retirement Solution

    The attendee of this webcast will learn about a new free plug-in for the Symantec Management Console called TechTurn Retirement Solution. TechTurn Retirement Solution extends the power of the Altiris management software by automating the often ignored "Last mile" in an asset's life. Now one can use the Symantec Management...

    Provided By Symantec

  • Webcasts // Oct 2009

    To Green or Not to Green. That Is the Question

    Green IT impacts costs, compliance, and customer perceptions, making it a top business priority for Executives across the world. The attendee will learn how the Renault F1 Team has successfully implemented Green IT initiatives, what they learned in the process, and what they are doing today to continue being green....

    Provided By Symantec

  • Webcasts // Jan 2010

    Securing 2010: Perspectives From Industry Security Bloggers

    With trends such as the rise of polymorphic threats, an increase in reputation hijacking and the vast propagation of rogue security software, 2009 made a mark with its fair share of malicious activity. However, new trends in the industry offered encouragement to security administrators as the year came to a...

    Provided By Symantec

  • Webcasts // Jun 2009

    How to Improve a Clinician's EMR Experience and Reduce Costs Through EndPoint Virtualization

    If anyone is in the planning stages or have implemented an EMR, the doctors and nurses may be experiencing challenges with accessing patient information. Quick and secure access to clinical applications at the point of care is a critical factor for successful EMR adoption. The attendee of this webcast will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // Jul 2009

    The Economics of Green IT: Start Saving Money

    CIOs pay millions of dollars a year to power and cool data centers. Many enterprises, some for the first time this year, have shifted the energy bill from facilities to IT, with the hope - and expectation - that IT can lower energy costs. In addition, many enterprises seek to...

    Provided By Symantec

  • Webcasts // Jul 2009

    Put Data Storage on a Diet With Symantec Deduplication

    If there's one absolute in business, it's that data will continue to grow. Organizations of all sizes around the world wrestle with an ever-growing array of information management headaches, storage concerns and recovery needs. And increasingly, organizations are turning to data deduplication to address these issues. But how one will...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and CommVault Simpana

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions - Backup Exec and NetBackup - versus CommVault Simpana, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or...

    Provided By Symantec

  • Webcasts // Jul 2009

    Introducing Veritas Storage Foundation HA 5.0 for ASE Cluster Edition - Increasing the Manageability, Availability and Performance of Sybase ASE Cluster Edition Environments

    The attendee of this webcast will learn how Symantec's market-leading storage management and clustering technology offers increased manageability, high availability and high performance in a Sybase ASE Cluster environment. Sybase Adaptive Server Enterprise is optimized for managing vast transaction processing systems involving thousands of users. Now, for applications that require...

    Provided By Symantec

  • Webcasts // Sep 2009

    Dedupe - How to Be a Hero With NetBackup

    Do More With Less - how many times has management tasked to do that? Well with the NetBackup Platform one really can. With the data deduplication capabilities of NetBackup PureDisk one can protect more and store less - up to 8x more than other deduplication products on comparable server hardware....

    Provided By Symantec

  • Webcasts // Sep 2009

    Prevent Security Breaches by Protecting Information Proactively

    Which organizations want to be in the news because of a security breach? Threats to corporate information continue to increase and IT organizations now have to worry about internal and external attack vectors - including employees who may either intentionally or accidentally risk critical information. Loss of this critical information...

    Provided By Symantec

  • Webcasts // Sep 2009

    Manage and Secure Your Mobile Devices Efficiently

    The attendee of this webcast will learn how Symantec makes it easy to manage and secure mobile devices efficiently. A priority for IT organizations is to efficiently secure all their endpoints and gain confidence that corporate assets and business operations are protected and updated - all while controlling costs. After...

    Provided By Symantec

  • Webcasts // Sep 2009

    Reduce Costs With Good Systems Management Practices in Hard Economic Times

    As budgets are being slashed, IT is still expected to do more with less to support the business. With good systems management practices in place using products from Symantec such as Altiris Client Management Suite, IT professionals can reduce overall costs of owning PCs throughout their organization. This webcast will...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Protect More and Store Less (Part 4 of 4)

    Backup vs. archiving? Recovery vs. discovery? Which protects the data and which keeps the legal department off the back? This webcast looks at backup, recovery, and archiving. The presenter will discuss the business needs driving these areas of IT, as well as technical differentiation to demonstrate which information management solutions...

    Provided By Symantec

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • Webcasts // Aug 2009

    Automating Server Management Processes With Workflow

    This webcast will discuss the benefits of automation, or workflow, within an IT department to help reduce the time that administrators spend on mundane, repetitive and manual tasks. The webcast will highlight the Altiris Workflow Solution and give several real-world examples of how server focused IT processes can be automated...

    Provided By Symantec

  • Webcasts // Dec 2009

    Automate Your Security Awareness Training

    Research shows that the single most important cause of data breaches is the inadvertent violation of basic information security precautions by well-meaning employees. Whether it is storing confidential data unencrypted on a removable device that may be lost or stolen - or simply sharing proprietary information in a crowded elevator...

    Provided By Symantec

  • Webcasts // Dec 2009

    Optimize Your Storage - Storage Resource Management in VMware Environments With Veritas CommandCentral

    With physical storage now separated by two or more degrees from the logical storage an application consumes, traditional storage management approaches are no longer valid. The task of understanding and optimizing resources that applications depend on - which now traverses the virtualization layer - can be a daunting one for...

    Provided By Symantec

  • Webcasts // Dec 2009

    Storage Management and Backup & Recovery: Best Practices for Microsoft Hyper-V Environments

    Virtualization introduces new requirements that affect IT business continuity such as backup, disaster recovery, and storage management. Ensuring rapid and reliable application and data recovery while controlling storage growth can be challenging as virtualization creates a whole new set of complexities. Symantec integrates with the leading virtualization platforms, including Microsoft...

    Provided By Symantec

  • Webcasts // Dec 2009

    Backup and Recover Your VMware and Hyper-V Machines in Seconds

    Whether considering implementing a virtual environment or are already experiencing the benefits of virtualization, backing up and recovering the guest machines, files and folders in a virtual environment is a new challenge one have to solve. Symantec Backup Exec 12.5 allows companies to save time and cost associated with data...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec

  • Webcasts // Jan 2010

    Announcing Backup Exec 2010: Protect More, Store Less, Save More

    If one is like most growing companies, one is facing an increased challenge to backup all the data while keeping storage costs under control. Would one like to improve the backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jan 2010

    Hydraq Attack Update - Ensure Your Organization Is Secure

    Hydraq (aka "Aurora") is the latest high profile security incident to hit the news. Hydraq is a targeted attack that is also currently referred to as Aurora, Google Attacks, and the Microsoft IE Vulnerability. Through the exploitation of a vulnerability, it attempts to install a trojan on a specific computer...

    Provided By Symantec

  • Webcasts // Jan 2010

    Get Leaner and More Resilient With the New Storage Foundation and Veritas Cluster Server 5.1 Release

    The attendee of this webcast learns about the recent 5.1 launch of Veritas Storage Foundation, Veritas Cluster File System and Veritas Cluster Server, Symantec's industry-leading heterogeneous storage management and high availability solutions. This webcast will cover new capabilities that will help the attendee optimize storage resources and reduce downtime: Considering...

    Provided By Symantec