Τεχνολογίες backup & Disaster Recovery επόμενης γενιάς από τη Symantec

Manage webcast
Antonios Giannas, Technology Sales Consultant
This webcast is hosted in Greek.

Συζήτηση για το πώς οι οργανισμοί μπορούν να εκμεταλλευτούν το ‘νέφος (cloud)’ που παρέχει η Symantec (Symantec.cloud), συνδυάζοντας υπάρχοντες τεχνολογίες. Οι λύσεις Netbackup & Backup Exec παρέχουν τη δυνατότητα δημιουργίας private & public cloud-based storage και σταδιακής μετάβασης των δεδομένων, ανάλογα με τις τωρινές και μελλοντικές ανάγκες των οργανισμών.
Mar 27 2012
54 mins
Τεχνολογίες backup & Disaster Recovery επόμενης γενιάς από τη Symantec
backup data security
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3711)
  • Upcoming (95)
  • Date
  • Rating
  • Views
  • At the heart of any effective risk process are two common qualities of strong team work and open communication. This, supported by strong action and solution orientation enable the Risk Management function to carry out its mandate effectively. Risk Champions are central to this, and used well, they become the glue that can hold risk activities together.
  • Learn about the powerful, new Arcserve Cloud which is a fully-integrated, cloud data protection solution for backup, disaster recovery and long-term retention. It’s offered as a service extension to Arcserve’s Unified Data Protection (UDP) appliance. Also discover technical details of Arcserve UDP, a next-generation data protection solution that leverages global deduplication, encryption, compression, and WAN-optimized replication.
  • An overview of defending against the bad guy, by Tim Grieveson - Chief Cyber Security Strategist for ESP, an ex CIO/CISO himself gives his views and vision based on the HP cyber security risk report.
  • How confident are you about your company’s network security? Most people do not know that their firewall is inadequate.

    Let us show you how you could be in a better position to both understand your current level of preparedness for network attacks and improve areas where your protection measures may be weak.
  • As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT's role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.

    IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results. By implementing a business risk approach to IT governance corporations can deliver immediate benefits to the entire organization.

    Join Eric Kavanagh, the Bloor Group; Paul Quanrud, TCS; Keith Breidt, BAH; and Yo Delmar, MetricStream; for this educational session as they address some of the key concepts and challenges with IT governance. They will answer as many questions as we can fit in to the 45 minute Q&A, and will provide research materials for you to takeaway.

    If you would like to attend please confirm your position below.
  • How to Align Identity Management and Access Control with Content and Collaboration

    The impetuses for cloud app adoption are still in full force: greater accessibility, elastic licensing, reduced infrastructure and improved business agility, among others, are creating new and exciting ways to reduce IT costs and complexity and meanwhile improve productivity and profitability. While the benefits are clear, technology leadership are still apprehensive due to key considerations around security and access control. Business-critical information now lives outside the traditional corporate perimeter while IT has little visibility and control over the apps and devices being used. Technology leaders and end users alike are seeking simple and secure application access.

    Join us in this session where we explore key trends, challenges and solutions from OneLogin and Dropbox, and how real estate management company Bigos Management has delivered secure and convenient access to their cloud applications to their workforce.In this session, you will learn:

    - Why Identity and Access Management is important today
    - How IAM fits into a broader cloud security program
    - How IAM aligns with File Storage and Collaboration
    - How Bigos Management has successfully leveraged OneLogin and Dropbox in their business
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • Cloud computing and DevOps are letting enterprises deploy new software faster than ever. But with development organizations focused on speed, are you achieving time to market at the expense of cyber security?

    Run time application self-protection (RASP) is a new approach to application security that enables production applications to spot and block cyber attacks from within the application itself—without recompiling and without sacrificing performance. Join the webinar to learn:

    How to enable new and legacy applications to protect themselves in as little as 10 minutes
    The four situations where RASP is the best solution
    Why Gartner says RASP is a must-have technology for bi-modal IT
  • When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.

    About the presenter:

    Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter http://twitter.com/k8em0 and http://twitter.com/hacker0x01
  • Channel
  • Channel profile
Webcasts targeted to IT Professionals.
Webcast topics include Storage Management, High Availability and Cluster Technology.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Τεχνολογίες backup & Disaster Recovery επόμενης γενιάς από τη Symantec
  • Live at: Mar 27 2012 8:00 am
  • Presented by: Antonios Giannas, Technology Sales Consultant
  • From:
Your email has been sent.
or close
You must be logged in to email this