Hi {{ session.user.profile.firstName }}

Simplifying your Backup Infrastructure with the Symantec Backup Exec 3600 Applia

Manage webcast
Sharon White, Senior Manager, Product Marketing
Today's challenges of protecting virtual and physical servers have been caused by the proliferation of as many as seven different backup solutions in a single environment, alongside integration problems between the hardware and software. Individual point solutions for target deduplication and virtual machine backup have only added to the complexity. The Symantec Backup Exec appliance delivers an end-to-end integrated backup solution for servers, storage, and software, reducing complexity, cost and risk. Join us for a 60 minute webinar where we:

• Provide an overview of the new all-in-one Backup Exec 3600 Appliance
• Discuss the benefits of built-in disaster recovery, deduplication, V-Ray technology, and Critical System Protection
• Talk about the next generation Backup User Experience

Now, you can leverage the benefits of a robust, fast, simple and modern approach to backup and recovery for both physical and virtual environments.

Register today to access the webcast for FREE.
Jul 19 2012
37 mins
Simplifying your Backup Infrastructure with the Symantec Backup Exec 3600 Applia
  • Date
  • Rating
  • Views
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • To make your Hadoop deployment enterprise-class, robust data replication is required to support business-critical functions that depend on Hadoop. Firms can no longer rely on the status quo of traditional, slow data backups into underutilized hardware.

    Enterprise class active-active replication delivers several benefits, including:
    - Maximum infrastructure resource utilization
    - Better performance across geographies
    - Faster disaster recovery.

    In this webinar, learn how WANdisco Fusion enables true enterprise class replication for Hadoop.
  • During this webinar, Mustafa will explain how the GSM sector tasked to provide a public service by means of “communication” following natural disasters.

    He will discuss how the business continuity team coped in terms of Business Continuity, Information Services and Network Operations, Emergency Management & stakeholder communication via briefing some used cases. He will also explain used cases helped as an organisation to develop guidelines to determine tasks/actions to be performed for further possible cases & improvement areas to develop their processes. He will provide analysis from the ‘post mortem’ analysis that they made following the incident, and the lessons learned that you could apply around your business continuity strategies within your organisation.
  • Businesses are largely adopting business-grade file sync and share to enhance productivity and collaboration in the workplace, while enabling employees to work anytime, anywhere, using any device.

    Join us as we take a look at some of the current trends in the business-grade file sync and share market. Find out what you should be looking for when considering a business-grade file sync and share solution for your organization.
  • This webinar will explore the interrelationship between business continuity and risk, why they need each other to attract the attention of the C Suite and how to approach the implementation of an integrated framework for your organisation.
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • Omnichannel shopping and the Internet of Things are creating device proliferation and expanding the diversity of customer demands. Is your network ready?

    The converging wired and wireless worlds, along with best-in-breed cloud management applications, are offering ultimate network flexibility allowing for greater security, ease-of-management, and cost savings at the Edge.

    Join our webinar to discuss a direction for future-proofing your network platform with speaker and thought leader Ken Silay.

    Attendees will learn:
    •Trends and challenges in today’s network landscape
    •What are the elements of a future-proof network
    •What issues you need to consider to future-proof enterprise networks
    •How WAN Diversity is enabling IT productivity

    Who Should Attend?
    •Network Administrators/Engineers/Architects
    •CIO/CISO
    •IT Directors/Vice Presidents


    About Ken:
    Ken has held technology leadership positions throughout his career across multiple industries including retail, healthcare, consumer goods, medical devices and the United States military. He is as effective designing and implementing a strategy for corporate innovation as he is streamlining business process that yield hundreds of thousands of dollars in business and technology improvements. As problem solver and recognized thought leader, he is skilled at fusing analytic and creative thinking to deliver innovative solutions.

    Ken was selected as a 2015 Top Innovator by Retail Touch Points and Chairperson for the 2015 RIS News Technology Conference. Combining his technical education with solid people and business management experience he has forged effective partnerships to deliver large-scale projects and technical process improvements. He believes in leadership by example and is a trusted mentor. Ken is a change agent who would rather be the catalyst for change than the victim of it.
  • Cloud applications are fueling the data sprawl issues plaguing today’s businesses. With the rapid adoption of popular cloud applications and other cloud services, organizations must change the way data is managed, protected, and governed.

    The dispersion of data to laptops and mobile devices made up the first wave of data moving outside the data center. IT must now address a second: end user data going into the cloud. So how do organizations address their enterprise data availability and governance needs in this new world? With a new approach that follows the user and not their device.

    With Henry Baltazar, Sr. Research Analyst at Forrester Research, you will learn about:

    - The risks and data challenges posed by the adoption of popular cloud applications
    - Strategies to ensure data archiving, search and audit and eDiscovery for cloud application data
    - Opportunities to manage and control dispersed data, whether residing on laptops, mobile devices or in the cloud in a single, unified view
  • Cloud applications are fueling the data sprawl issues plaguing today’s businesses. With the rapid adoption of popular cloud applications and other cloud services, organizations must change the way data is managed, protected, and governed.

    The dispersion of data to laptops and mobile devices made up the first wave of data moving outside the data center. IT must now address a second: end user data going into the cloud. So how do organizations address their enterprise data availability and governance needs in this new world? With a new approach that follows the user and not their device.

    With Henry Baltazar, Sr. Research Analyst at Forrester Research, you will learn about:

    - The risks and data challenges posed by the adoption of popular cloud applications
    - Strategies to ensure data archiving, search and audit and eDiscovery for cloud application data
    - Opportunities to manage and control dispersed data, whether residing on laptops, mobile devices or in the cloud in a single, unified view
  • Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Simplifying your Backup Infrastructure with the Symantec Backup Exec 3600 Applia
  • Live at: Jul 19 2012 9:00 am
  • Presented by: Sharon White, Senior Manager, Product Marketing
  • From:
Your email has been sent.
or close
You must be logged in to email this