Browse communities
Browse communities
Presenting a webinar?

Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
    La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.

    Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • Whatever the reason for your data center transformation the challenges, complexities and costs associated with these projects can be daunting.

    Join this session where Andy Ebbs will discuss some of the technical challenges faced, the ways to overcome them and look at how the right solution can deliver projects on time at a much reduced cost.
  • Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • FREESTOR™
    Software-Defined Storage
    The power to seamlessly migrate, recover, protect, and deduplicate data - on or off the cloud - without tying your business to specific hardware, networks or protocols.
  • Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • FREESTOR™
    Software-Defined Storage
    The power to seamlessly migrate, recover, protect, and deduplicate data - on or off the cloud - without tying your business to specific hardware, networks or protocols.
  • Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
  • Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
  • Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,

    The webinar will be led by Ian Beale, Senior Director, CEB Risk
  • The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.

    Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.


    Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.

    The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.

    Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
  • Is Software Defined Storage (SDS) getting hijacked? It seems every vendor, old and new, is claiming that their storage is “software defined”. The original intent was to create software-only solutions that could be deployed on the customer’s choice of servers. But that original intent has evolved, and now hardware vendors are providing what they claim to be software defined storage solutions too. In addition, SDS is being combined with an embedded compute function to create hyper-converged solutions as well.

    In this webinar we will discuss the differences in these approaches and you will learn what the four key deliverables of a SDS solution should be so you can decide which makes the most sense for your organization.
  • If you’ve ever felt alone with your data protection frustrations, this webcast will prove you’re not ― and that there are some simple, real-world strategies that’ll make your job a whole lot more enjoyable. We’ve put together a panel of IT professionals from a range of industries ― including a network engineer, an IT director and a CTO ― to share with you what worked for them, and what didn’t, when it comes to data protection. You’ll get to hear about the common struggles they shared and the best practices that empowered them to stop wasting time and energy on slow backup and recovery processes.

    By the end of this educational webcast, you’ll be able to:

    •Manage the gap between users who expect "always on" and the reality of system downtime.
    •Overcome the headache of administrative challenges.
    •Modernize your data protection strategy while keeping costs low and meeting requirements.
  • What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.
  • Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices. Hadoop clusters can use a mix of solid-state and spinning disk storage, while Hadoop compatibility layers and connectors can use enterprise storage systems or share storage between Hadoop and legacy applications.

    In this webinar, 451 Research Director Matt Aslett will review the storage options available to Hadoop architects and provide recommendations for each use case. WANdisco's Randy DeFauw will then present an active-active replication option that makes data available across multiple storage systems.
  • For disaster recovery (DR), you’ve outsourced or virtualized your network, infrastructure, applications and telephony system. Your data is stored in multiple, secure locations, and you’re safe from hurricanes, tornados and blackouts. But what about a pumpkin-spiced latte?

    The desktop is the most overlooked and vulnerable link in your disaster recovery plan. Whether a device is disabled from a coffee spill, a hardware failure, theft or vicious malware, the result is the same: your employee loses access to her desktop, primary lines of communication, and user data. Productivity comes to a grinding halt. One computer, with one access, can snowball into a local or a global problem. You’re only one desktop away from disaster.

    There is a solution: virtualize the desktop. Join Michael McCracken, Director, Professional Services at Hosting, and Steve Prather, CEO of Dizzion, on May 14th, 2015 at [time] for a revealing look at how top planners are now integrating Desktop as a Service (DaaS). This 45-minute webcast is ideal for IT leaders, business risk and compliance professionals, and disaster recovery / business continuity planners.

    Attendees will learn:
    • The basics of Disaster Recovery and accessibility of your data
    • How to extend your DR strategy all the way to the desktop
    • DaaS deployment best practices
  • Cloud. Convergence. Software-defined storage (SDS). What does it all really mean, and why should enterprise organizations care?

    Get a peek into the future with IDC’s Senior Research Analyst, Storage Systems Amita Potnis as she joins Seagate Chief Technology Evangelist David A. Chapa and Director, Global Alliance Partners Michael K. Connolly for a live webinar that will help you meet the challenges of storage now and into the future. Here’s some of what you’ll learn:

    -Top peer challenges, according to leading industry research
    -What the future holds for the competing data storage architectures
    -The difference between converged and hyper-converged infrastructures
    -Best and worst use case for SDS

    How can enterprises know what is right for their environments? What differentiates a converged infrastructure from a hyper-converged infrastructure? Find out at this webinar.
  • If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
    Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
    On this webcast we will cover;
    •The main security challenges and trends in 2014
    •Highlight how threats operate to allow you to better informed
    •Key takeaways for executive / functional leaders
  • ISO 31000 was published as a standard on the 13th of November 2009, and provides a standard on the implementation of risk management. A revised and harmonised ISO/IEC Guide 73 was published at the same time. The purpose of ISO 31000:2009 is to be applicable and adaptable for "any public, private or community enterprise, association, group or individual."[3] Accordingly, the general scope of ISO 31000 - as a family of risk management standards - is not developed for a particular industry group, management system or subject matter field in mind, rather to provide best practice structure and guidance to all operations concerned with risk management.
  • With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.

    In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.