Backup Exec 2012 with V-Ray

Symantec
Watch our latest video on Backup Exec 2012 and see how easy Backup Exec 2012 is to use with loads of new features including Bare Metas Disaster Recovery and more.
May 14 2012
5 mins
Backup Exec 2012 with V-Ray
Backup data loss security
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5260)
  • Upcoming (139)
  • Date
  • Rating
  • Views
  • Join Tom Kellerman, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who need to develop and implement a comprehensive cyber security strategy. Tom will highlight critical information including 2015 cyber threat trends and how risk management strategies have changed.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
    • And more...
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Channel
  • Channel profile
  • De la gestion…à la gouvernance des données Apr 2 2015 8:00 am UTC 45 mins
    Le débat sur l’explosion – voire la prolifération des données – est un sujet pour toutes les entreprises, quelle que soit leur taille. C’est aussi une problématique qui semble sans fin pour tous les services informatiques : quelles solutions apporter à l’augmentation exponentielle de l’information ?
    Il faut mesurer le risque induit par une mauvaise protection pouvant occasionner des violations de données : risque financier bien sûr, impact sur la réputation, mais aussi et surtout, risque juridique. Les entreprises ont en effet soumises à des temps et des termes de conservation de données. Découvrez comment Symantec peut vous aider à mettre en place une bonne gouvernance de l’information dans votre entreprise. Au programme :
    -Qu’est-ce que la gouvernance de l’information?
    -Mettre en place une politique adaptée à votre entreprise
    -Cas concrets : comment répondre aux problématiques business relatifs à la conservation et la gestion des données
  • Symantec Webcast, sei pronto per l’archiviazione senza limiti? Mar 19 2015 11:00 am UTC 30 mins
    La piattaforma Symantec Enterprise Vault ™ è una soluzione leader per l’archiviazione on-premise tanto che da 10 anni è leader nel Magic Quadrant di Gartner (Enterprise Information Archiving); consente infatti alle organizzazioni di archiviare in modo efficiente, di gestire, di scoprire e di recuperare informazioni non strutturate. E da oggi ANCORA PIU’ efficace con funzionalità aggiuntive importantissime, quali:

    Prestazioni ancora più veloci - con Enterprise Vault Search & Mail Connect (Mac & Mobile)
    Accesso alle informazioni archiviate quando e dove vuoi
    Fino a 18x velocità di navigazione più veloce

    Una piattaforma ancora più ampia - con Mail Connect (Archiviazione per l’utente finale)
    Mantieni tutte le informazioni significative per la tua organizzazione
    Estendi l’archiviazione su qualsiasi piattaforma e-mail; on premise o cloud

    Produttività ulteriormente migliorata - con migrazione dei PST e migliorie SCOM, V2
    Spendi meno tempo per la gestione dell'archivio
    Riduci fino al 45% del tempo speso per lo svolgimento delle attività di controllo quotidiane
  • Is your Backup and Recovery delivering on ROI? Mar 17 2015 10:30 am UTC 45 mins
    Today, organisations of all sizes are undergoing a significant IT-driven transformation. IT environments have reached a point where complexity in existing backup and recovery infrastructures is often a vast and unwieldy mix of both physical and virtual servers, along with different hardware and software solutions. While information volumes are rising continually, backup windows shrink and IT must operate around the clock.

    All of this creates challenges in the backup environment, making it both difficult and costly to manage backup and recovery holistically. Therefore, IT leadership is increasingly looking for better ways to protect their data. It is not just because existing backup solutions are broken (some are, some are legacy, some are point products, and others just aren’t scaling and/ or performing as their IT environments evolve) – but that’s not all of them. In many cases, IT leadership is just trying to improve what they are doing, often from a return-on-investment (ROI) perspective, not technical features.

    In this webcast we address how you can modernise backup and recovery and gain financial advantages that contribute to an improved ROI.
  • Au-delà de la virtualisation: l’agilité d’un Datacenter Mar 12 2015 10:00 am UTC 30 mins
    Le traditionnel paysage du datacenter a changé pour toujours, laissant l'infrastructure virtualisée délivée comme un service. Nous assistons, en effet, à une virtualisation qui s’est étendue bien au-delà de l'informatique , avec le stockage et la virtualisation réseau qui sont devenus rapidement la norme pour la plupart des organisations. Ce modèle est vrai indépendamment du fait que l'infrastructure soit gérée en interne dans l’entreprise ou dans le Cloud. Etant donné que l'infrastructure devient hautement virtualisée et se dirige de plus en plus vers le cloud privé , les ressources informatiques traditionnelles doivent aussi évoluer au risque de devenir inutile.

    Découvrez comment Symantec peut vous aider à renforcer l'agilité du datacenter grâce à une infrastructure élastique, la mise en place d'un modèle de services et l'exploitation de l'intelligence informatique.

    •Améliorer l'élasticité de l’infrastructure
    •Fournir des ressources as-a-Service
    •Cultiver l’Intelligence informatique
  • Storage Foundation 6.2: Increasing application performance & High Availability Recorded: Feb 17 2015 55 mins
    Storage Foundation High Availability 6.2 Increases Performance, Efficiency & Flexibility in the Data Center

    Performance

    •Seamlessly adopt SSD/Flash on Solaris Sparc, AIX and VMware
    •Faster recovery of Cisco UCS service profiles and SAP applications

    Efficiency

    •Experience better ROI – realize up to 4X performance at up to 20% cost
    •Intelligent high-availability – Dynamic failover prioritization for virtual machines

    Flexibility

    •Combine ultra-fast DAS with next-generation interconnects
    •Experience near-local read and write performance to and from remote disks
  • How confident are you that your IT Systems will survive a Disaster? Recorded: Feb 3 2015 29 mins
    Managing mission-critical applications? Laying the foundation for a private cloud? Or simply working to meet your enterprise’s day-to-day technical and business demands? All require an infrastructure that’s flexible yet highly available and resilient.

    Follow this Webinar and learn how to:

    • Ensure critical data, applications, and complete systems are protected in the case of a disaster
    • Provide disaster recovery for production applications in virtual server environments
    • Deliver Disaster Recovery as a Service to different cloud platforms
    • Reduce the complexity of managing heterogeneous server and storage platforms
    • Reduce the costs of building and managing disaster recovery infrastructure
  • Définir la bonne architecture de stockage avec NetBackup 7.6 et les Appliances Recorded: Jan 8 2015 35 mins
    Depuis l'ère de la sauvegarde sur bande, votre choix de stockage secondaire n'a cessé de s'élargir : bande, disque, snapshots, cloud, appliances de déduplication. Lors de ce webcast, nous étudierons les bénéfices et limites de ces différents choix, les architectures actuelles (telles que disk-to-disk-to-tape), et les bonnes pratiques pour faire le bon choix en fonction de vos besoins et de votre gestion des coûts.
  • Mythes et croyances autour de la gestion de l'Information Recorded: Jan 8 2015 48 mins
    Les mythes et croyances liés à l'IT persistent depuis des années sans être remis en cause. Le postulat 'c'est comme cela que ça a toujours été' ne peut plus soutenir une décision IT ayant un impact négatif sur l'image, la santé et la performance de votre entreprise. Assistez à ce webcast pour en finir avec les fausses idées et découvrir comment mettre en place facilement une vraie stratégie de gestion de l’Information en tenant compte de son cycle de vie et à sa pertinence, grâce aux solutions d'archivage et d'e-discovery.
  • South for the Winter: Your Migration from Windows 2003 Recorded: Dec 3 2014 40 mins
    Windows 2003’s support life is coming to an end and, come July 2015, you will no longer get the help and support you need to keep functions running. But what does this mean? How will this affect you? What can and should you do?

    First, don’t panic! Second, join Barnaby Wood for this interactive webinar as he helps you to understand what this End of Support Life means, as well as identify areas of risk in your backup environment and provide an introduction to how you can get help to mitigate that risk, whether your choice is hardware and operating system upgrades, consolidation through server virtualization or continued use of Windows 2003
  • Backup Exec 2014 – Top Tips Recorded: Nov 6 2014 43 mins
    Backup Exec 2014 delivered significant changes to drive performance, efficiency and usability improvements across physical and virtual environments. Join this webcast to understand what those changes are in more detail and to learn about the features and settings that Symantec’s technical teams use in configuring environments.

    After watching this webcast you will understand how to performance tune a Backup Exec environment and minimise data loss by protecting your data more frequently and recovering more effectively.
  • Transforming Your Data Center To Maximize Business Performance Recorded: Oct 23 2014 54 mins
    Symantec's data center portfolio is uniquely positioned to increase IT agility, thus helping customers realize the vision of an "Agile Data Center". Performance is a key element of agility. Considering the recent opinion by a leading storage vendor's CTO that "Tier-1 storage is now a capacity tier," it's time to evaluate whether your organization is investing resources in a storage infrastructure that cannot meet the flexibility and performance requirements of your critical applications

    Attend this Session and to discover:

    •How you can get Tier-0 performance at a Tier-3 price without putting your data at risk. Members of Symantec and Intel will demonstrate how Symantec Storage Foundation and Intel Solid State Devices can accentuate the value of direct-attached storage.

    •How to maximize your existing infrastructure without re-architecture.

    •How Symantec and Intel provide greater performance at a fraction of the cost of traditional SANs without impacting availability or data redundancy
  • Backup Exec 2014, Backup Appliances Recorded: Oct 16 2014 61 mins
    You are invited to attend this webinar to hear how the Backup Exec 2014 delivers powerful, flexible data protection and disaster recovery through a single, unified solution.

    During this webinar we will introduce you to the benefits of Backup Exec 2014 including:
    •Unified protection for virtual and physical environments
    •Powerful and flexible backup and recovery with improved performance
    •New platform and application support
    •Robust user interface to monitor and manage all your jobs from a single view
    •Faster upgrades and migration with minimal management
    •Simplified licensing and enhanced usability

    Also we will talk about Backup Appliances – integrated software and hardware solution that provides an easy, complete, and cost-effective backup of physical and virtual servers.
  • DRO - Symantec Disaster Recovery Orchestrator Recorded: Sep 25 2014 43 mins
    Symantec™ Disaster Recovery Orchestrator enables customer to manage and automate the takeover and failback of Microsoft Windows-based applications residing on either physical or virtual machines (VMs) to the Microsoft Azure cloud.

    Join our webcast to find out how you can;
    • Minimise upfront and ongoing costs associated with DR in the cloud
    • Automate and simplify application takeovers and failbacks
    • Create a world where disaster recovery for Windows applications is only a click away
  • DRO - Symantec Disaster Recovery Orchestrator Recorded: Aug 12 2014 38 mins
    Symantec™ Disaster Recovery Orchestrator enables customers to manage and automate the takeover and failback of Microsoft Windows-based applications residing on either physical or virtual machines (VMs) to the Microsoft Azure cloud.

    Join our webcast to find out how your customers can;
    • Minimise upfront and ongoing costs associated with DR in the cloud
    • Automate and simplify application takeovers and failbacks
    • Create a world where disaster recovery for Windows applications is only a click away
  • SYMANTEC SYMCAST: Introducing Backup Exec 2014 Recorded: Jul 9 2014 7 mins
    Welcome to the first of the Symantec Symcast webinars.

    The SymCast webinars are a series of free, on-demand playback webinars designed to give you a 10 -15 minute introduction to Symantec solutions. Each webinar will focus on how Symantec solutions can address common customer challenges.

    In this first webinar, learn how Backup Exec 2014 can help with the following:
    •Scale to protect both physical and virtual infrastructures
    •Efficiently backup and recover virtual platforms across VMware and HyperV
    •Manage growing data volumes and reduce storage costs
    •Simplify disaster recovery
    •Flexibly backup to multiple storage platforms including disk, tape and cloud
    •All with ease of management via the reintroduced job monitor and multi-server backup
  • Enterprise Vault 11.0 : archivage des messageries et mobilité Recorded: Jul 4 2014 49 mins
    Vous êtes toujours confrontés à l’augmentation du volume des données et du besoin d'accès de vos utilisateurs de n'importe quel terminal. Cela engendre des problématiques de performance de vos infrastructures, de gestion de la sauvegarde, de service aux utilisateurs, et de gouvernance.

    Symantec vous invite à découvrir comment la nouvelle version de sa solution d’archivage Symantec Enterprise Vault 11.0 peut répondre à vos enjeux.

    Lors de ce webcast, nos experts vous présenteront comment :
    -Mettre en place une stratégie d’’archivage des différentes plateformes de messagerie (Zimbra, Groupwise, Office 365, Gmail) : quels usages, quelles solutions, pour quels bénéfices
    -Améliorer l’expérience utilisateurs en leur permettant d’accéder aux archives de n'importe quel terminal d'entreprise (PC, smartphone, tablette)
  • Webinar Backup Exec 2014 Recorded: Jul 4 2014 76 mins
    Уважаемые Коллеги!
    Приглашаем Вас принять участие в в вебинаре, посвященном обзору новых возможностей Backup Exec 2014.
    Новая версия программы Backup Exec 2014, представляет собой единое решение по защите критически важных данных организаций за счет мощного, гибкого резервного копирования и восстановления данных в различных гибридных физических и виртуальных средах.
    На online встрече, которая пройдет 20 июня, вы узнаете о новых функциональных возможностях Backup Exec 2014, включая:
    •до 100% более быстрое резервное копирование и восстановление данных,
    •интеграция с Windows Server 2012,
    •гранулярное восстановление Exchange 2013 и SharePoint 2013
    •более высокую прозрачность управления резервным копированием и восстановлением данных,
    •расширенную поддержку облачных вычислений и возможность непрерывной миграции и обновления данных
  • Backup Exec 2014 Launch Recorded: Jul 3 2014 49 mins
    Announcing the release of Backup Exec 2014, you are invited to attend this webinar to hear how the 2014 release delivers powerful, flexible data protection and disaster recovery through a single, unified solution. During this webinar we will introduce you to the benefits of Backup Exec 2014 including:
    •Unified protection for virtual and physical environments
    •Powerful and flexible backup and recovery with improved performance
    •New platform and application support
    •Robust user interface to monitor and manage all your jobs from a single view
    •Faster upgrades and migration with minimal management
    •Simplified licensing and enhanced usability
  • Backup Exec 2014 : la solution de protection de vos env. physiques et virtuels Recorded: Jul 2 2014 45 mins
    A l’occasion du lancement de la nouvelle version de Backup Exec 2014, nous vous invitons lors de ce webcast à découvrir les bénéfices d’une solution complète de protection et de restauration des données grâce aux dernières fonctionnalités :
    • protection unifiée des environnements virtuels et physiques,
    • sauvegardes et restaurations flexibles et performantes,
    • nouvelle plateforme et support des applications,
    • interface robuste pour gérer et administrer tous les jobs de façon centralisée,
    • mise à jour et migration facilitées,
    • mode de tarification simplifié .
  • Webinar Backup Exec 2014 Recorded: Jun 20 2014 53 mins
    Уважаемые Коллеги!

    Приглашаем Вас принять участие в вебинаре, посвященном обзору новых возможностей Backup Exec 2014.

    Новая версия программы Backup Exec 2014, представляет собой единое решение по защите критически важных данных организаций за счет мощного, гибкого резервного копирования и восстановления данных в различных гибридных, физических и виртуальных средах.

    На online встрече, которая пройдет 20 июня, вы узнаете о новых функциональных возможностях Backup Exec 2014:
    •до 100% более быстрое резервное копирование и восстановление данных,
    •интеграцию с Windows Server 2012,
    •гранулярное восстановление Exchange 2013 и SharePoint 2013,
    •более высокую прозрачность управления резервным копированием и восстановлением данных,
    •расширенную поддержку облачных вычислений и возможност непрерывной миграции и обновления данных

    Докладчиком выступит эксперт компании Symantec по IT инфраструктуре, Максим Цветаев. Представленная на вебинаре информация специально ориентирована на партнеров и дистрибуторов компании Symantec.
    Участие в вебинаре бесплатное. Количество мест ограничено. Необходима предварительная регистрация.
    Ждем вас на мероприятии!
    С уважением,
    Компания Symantec
Webcasts targeted to IT Professionals.
Webcast topics include Backup, Recovery, Storage, Data Protection, Disaster Recovery, Archiving and e-Discovery.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Backup Exec 2012 with V-Ray
  • Live at: May 14 2012 9:40 pm
  • Presented by: Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this