Hi [[ session.user.profile.firstName ]]

Backup Exec 2012 with V-Ray

Watch our latest video on Backup Exec 2012 and see how easy Backup Exec 2012 is to use with loads of new features including Bare Metas Disaster Recovery and more.
Watch our latest video on Backup Exec 2012 and see how easy Backup Exec 2012 is to use with loads of new features including Bare Metas Disaster Recovery and more.
Recorded May 14 2012
5 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Presentation preview: Backup Exec 2012 with V-Ray
Recommended for you:
  • Date
  • Rating
  • Views
  • Ransomware: Dark Money and Emerging Threats Ransomware: Dark Money and Emerging Threats Michael Aguilar, Business Product Technical Lead, ESET North America Recorded: May 25 2016 55 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Cloud Storage: The 5 Reasons IT Can Do it Better Cloud Storage: The 5 Reasons IT Can Do it Better George Crump, Storage Switzerland Recorded: May 25 2016 61 mins
    In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.

    In this webinar you will learn:

    1. What Public Cloud Storage Architectures Look Like
    2. Why Public Providers Chose These Architectures
    3. The Problem With Traditional Data Center File Solutions
    4. Bringing Cloud Lessons to Traditional IT
    5. The Five Reasons IT can Do it Better
  • Enterprise Data Center Selection Criteria for Business in Southeast Asia Enterprise Data Center Selection Criteria for Business in Southeast Asia Kelly Morgan - 451 Research, Dalton Yap - Telin Recorded: May 25 2016 44 mins
    More than 20% of MNCs we surveyed currently have plans to expand into the SE Asia region, and are now considering their options to use third-party colocation/cloud exclusively, or in combination with on-premise IT deployments.

    Much of the current market activity is being driven by MNCs needing to build out their DC presence to serve as gateways to and from mainland China, and other high-growth markets in the region. Over a third of MNCs plan to increase their usage of colocation providers for their future IT deployments and are actively considering data center locations in established preferred locations of Singapore, Hong Kong or Tokyo - driven by factors such as regulations, geographical location, and the skills of the local workforce.

    So what are the key selection criteria, and how do certain locations compare?

    Singapore continues to be poised for solid growth, with an active supply pipeline, demand from local and international companies, and high-quality facilities. But do other factors, such as power supply costs, choice of bandwidth or the availability of carrier neutral space make it as an attractive location for datacenter investment as Hong Kong or Tokyo? Should MNCs look at Malaysia or Indonesia as possible areas for expansion as well, which could potentially offer lower-cost options for firms, as well as a way to target the local market in each country?

    This session will answer all the key questions such as:
    •Do Multinationals prefer to Own or Rent Datacenters in South-East Asia?
    •Why Do Organizations Need More Datacenter Space?
    •When Will They Need More Datacenter Space?
    •How Much Datacenter Space Will They Need?
    •What is Driving Datacenter Location Selection?
    •What Would Organizations Likely Do if They Needed More
    Datacenter Space/Power Capacity in SE Asia?
  • PCI DSS: Preventing Costly Cases of Non Compliance PCI DSS: Preventing Costly Cases of Non Compliance Mathieu Gorge, VigiTrust; Terence Spies, HPE Security – Data Security; Derek Brink, Aberdeen Group; Dan Fritsche, Coalfire Recorded: May 24 2016 62 mins
    There is a substantial cost associated with reaching and maintaining PCI DSS compliance requirements, but the cost of non-compliance is often much greater. While the initial cost of the technology, staff and other resources necessary to implement satisfactory controls has its price tag, it is vital that all organizations affected by the PCI standard consider both the short and long-term costs of non-compliance as well as the benefits to meeting the requirements.

    This is especially important as PCI DSS evolves and increase in complexity as the standard moves towards becoming a federal regulation. The costs of non-compliance can far exceed the cost of systems to bring a company into compliance, as demonstrated by so many high profile data breaches. Join this executive panel as we discuss ways to prevent costly cases of non compliance with PCI DSS.
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: May 24 2016 60 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.


    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication
  • Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Steven Sanderson – WW SMA Product Marketing Manager Mark Hewett – WW SMA Product Manager Recorded: May 24 2016 30 mins
    See how it’s possible to give end-users fast, simple access to enterprise applications, data and resources – without compromising your security.

    In this live webinar, you’ll hear from two Dell Security solution experts on how you can manage the proliferation of devices in your workplace.

    During the interactive session, you’ll see how to:
    • Ensure only authorized users and approved devices are granted access to your business network
    • Quickly and easily provision secure mobile access and role-based privileges
    • Keep company data secure in-flight and at rest on devices
  • 4G Failover — Preventive Care for Your Healthcare Network 4G Failover — Preventive Care for Your Healthcare Network Ed Walton and Roger Billings of Cradlepoint Recorded: May 24 2016 45 mins
    For healthcare campuses and offices, the consequences of just a few minutes of downtime ripple across the entire organization’s operations. The proliferation of cloud applications also means suspended connectivity can cause catastrophic problems, and patients’ health and safety could be put at risk.

    While short outages are common, longer service disruptions can be catastrophic, paralyzing operations for hours. Grave as the immediate impacts of service outages are, your organization can continue to feel the consequences long after the connection has been repaired, due to damaged patient or partner loyalty, loss of trust, and diminished faith in the IT department as a whole.

    No healthcare organization wants to face these scenarios. Join us for a live webinar on Tuesday, May 24th, at 9 am PDT/12 pm EDT, because the question isn’t if your wired connectivity will go down, but what to do, or have in place, when it does go down.

    Attendees will learn about:

    + The consequences of network downtime for healthcare
    + The options for business continuity
    + How software-defined LTE connectivity is enabling the healthcare industry
    + Key considerations for choosing a wireless failover solution
  • Como garantir os SLAs de disponibilidade dos seus ambientes NAS e Big Data Como garantir os SLAs de disponibilidade dos seus ambientes NAS e Big Data Luis Feitor - Commvault Senior Systems Engineer Recorded: May 24 2016 40 mins
    Os dados não estruturados das empresas são cada vez mais um ativo imprescindível para os serviços e processos de negócio. No entanto, o seu crescimento exponencial faz com que as tecnologias tradicionais de proteção deste tipo de dados sejam não só ineficientes, como ainda incapazes de responder às necessidades de disponibilidade em ambientes empresariais.

    Neste webinar, iremos ver três áreas de inovação da Commvault que permitem responder às necessidades de proteção de dados não estruturados:

    -Na primeira parte, iremos mostrar as novidades da tecnologia IntelliSnap, que permite a integração com novos fabricantes de Storage e a gestão de réplicas de volumes; falaremos ainda da nova tecnologia de captura de blocos, que amplia o conceito de proteção contínua e consistente, a qualquer tipo de sistema de ficheiros e de base de dados, para dispor de um número ilimitado de pontos de recuperação de acesso nativo.

    -Na segunda parte, veremos como a nova versão do software da Commvault expande as suas capacidades a ambientes de Big Data. De acordo com a Gartner, mais de três quartos das empresas têm iniciativas de Big Data, e portanto a necessidade de gerir a disponibilidade destes dados é um desafio que se deve resolver a curto prazo.

    -Por último, iremos mostrar como as soluções NAS hiperescaláveis exigem tecnologias inovadoras para poder garantir a proteção e acesso aos dados que armazenam.

    Junte-se a nós para ficar a saber como a Plataforma de Gestão de Dados da Commvault lhe permite cumprir os seus SLA de disponibilidade de dados não estruturados, independentemente da tecnologia que escolha para armazenar e gerir estes ativos do seu negócio.
  • GDPR and the impact it will have on your organization GDPR and the impact it will have on your organization David Moseley, Chris Bridgland & Tamzin Evershed Recorded: May 24 2016 59 mins
    We look at how ready EU businesses are for the impending data privacy revolution and how a holistic approach to Information Governance not only helps you prepare for the regulation, but brings agility and innovation back to your IT systems.
  • Resiliency Response & Comms: Your first-line of defense against a disruption Resiliency Response & Comms: Your first-line of defense against a disruption Margaret Mills (IBM) Recorded: May 20 2016 64 mins
    Most businesses have near zero tolerance for service outages and disruptions, regardless of the cause. How do Business Continuity professionals demonstrate a positive ROI for applications while meeting always-on expectations? In an operationally always-on world, business communications must be real-time with rapid response to outages to keep your business running. To achieve this level of Operational Resiliency, you must implement automated communications that eliminate breakdown during a crisis event or disruption. Join this webinar to learn about the latest technologies that you can use today to automate communications for real-time incident and crisis management, regardless of the channel. Are you ready to respond to your next disruption?

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Backup Exec 2012 with V-Ray
  • Live at: May 14 2012 9:40 pm
  • Presented by: Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this