Browse communities
Browse communities
Presenting a webinar?

Simplifying your Backup Infrastructure with the Symantec Backup Exec 3600 Applia

Sharon White, Senior Manager, Product Marketing
Today's challenges of protecting virtual and physical servers have been caused by the proliferation of as many as seven different backup solutions in a single environment, alongside integration problems between the hardware and software. Individual point solutions for target deduplication and virtual machine backup have only added to the complexity. The Symantec Backup Exec appliance delivers an end-to-end integrated backup solution for servers, storage, and software, reducing complexity, cost and risk. Join us for a 60 minute webinar where we:

• Provide an overview of the new all-in-one Backup Exec 3600 Appliance
• Discuss the benefits of built-in disaster recovery, deduplication, V-Ray technology, and Critical System Protection
• Talk about the next generation Backup User Experience

Now, you can leverage the benefits of a robust, fast, simple and modern approach to backup and recovery for both physical and virtual environments.

Register today to access the webcast for FREE.
Jul 19 2012
37 mins
Simplifying your Backup Infrastructure with the Symantec Backup Exec 3600 Applia
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (111)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • The Agile Data Centre: Transform your cost centre to a competitive advantage Apr 16 2015 9:00 am UTC 45 mins
    Fernando Tavares, Technical Evangelist, Symantec
    Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • De la gestion…à la gouvernance des données Apr 2 2015 8:00 am UTC 30 mins
    Frederic Assuncao, Spécialiste archivage et gouvernance des données
    Le débat sur l’explosion – voire la prolifération des données – est un sujet pour toutes les entreprises, quelle que soit leur taille. C’est aussi une problématique qui semble sans fin pour tous les services informatiques : quelles solutions apporter à l’augmentation exponentielle de l’information ?
    Il faut mesurer le risque induit par une mauvaise protection pouvant occasionner des violations de données : risque financier bien sûr, impact sur la réputation, mais aussi et surtout, risque juridique. Les entreprises ont en effet soumises à des temps et des termes de conservation de données. Découvrez comment Symantec peut vous aider à mettre en place une bonne gouvernance de l’information dans votre entreprise. Au programme :
    -Qu’est-ce que la gouvernance de l’information?
    -Mettre en place une politique adaptée à votre entreprise
    -Cas concrets : comment répondre aux problématiques business relatifs à la conservation et la gestion des données
  • Symantec Webcast, sei pronto per l’archiviazione senza limiti? Recorded: Mar 19 2015 33 mins
    Roberto Dellavedova, Information Management Specialist, Symantec Italia
    La piattaforma Symantec Enterprise Vault ™ è una soluzione leader per l’archiviazione on-premise tanto che da 10 anni è leader nel Magic Quadrant di Gartner (Enterprise Information Archiving); consente infatti alle organizzazioni di archiviare in modo efficiente, di gestire, di scoprire e di recuperare informazioni non strutturate. E da oggi ANCORA PIU’ efficace con funzionalità aggiuntive importantissime, quali:

    Prestazioni ancora più veloci - con Enterprise Vault Search & Mail Connect (Mac & Mobile)
    Accesso alle informazioni archiviate quando e dove vuoi
    Fino a 18x velocità di navigazione più veloce

    Una piattaforma ancora più ampia - con Mail Connect (Archiviazione per l’utente finale)
    Mantieni tutte le informazioni significative per la tua organizzazione
    Estendi l’archiviazione su qualsiasi piattaforma e-mail; on premise o cloud

    Produttività ulteriormente migliorata - con migrazione dei PST e migliorie SCOM, V2
    Spendi meno tempo per la gestione dell'archivio
    Riduci fino al 45% del tempo speso per lo svolgimento delle attività di controllo quotidiane
  • Is your Backup and Recovery delivering on ROI? Recorded: Mar 17 2015 37 mins
    Arjan Van Proosdij, Technical Evangelist, Symantec
    Today, organisations of all sizes are undergoing a significant IT-driven transformation. IT environments have reached a point where complexity in existing backup and recovery infrastructures is often a vast and unwieldy mix of both physical and virtual servers, along with different hardware and software solutions. While information volumes are rising continually, backup windows shrink and IT must operate around the clock.

    All of this creates challenges in the backup environment, making it both difficult and costly to manage backup and recovery holistically. Therefore, IT leadership is increasingly looking for better ways to protect their data. It is not just because existing backup solutions are broken (some are, some are legacy, some are point products, and others just aren’t scaling and/ or performing as their IT environments evolve) – but that’s not all of them. In many cases, IT leadership is just trying to improve what they are doing, often from a return-on-investment (ROI) perspective, not technical features.

    In this webcast we address how you can modernise backup and recovery and gain financial advantages that contribute to an improved ROI.
  • Au-delà de la virtualisation: l’agilité d’un Datacenter Recorded: Mar 12 2015 30 mins
    Fernando Tavares, Technical Evangelist, Symantec
    Le traditionnel paysage du datacenter a changé pour toujours, laissant l'infrastructure virtualisée délivée comme un service. Nous assistons, en effet, à une virtualisation qui s’est étendue bien au-delà de l'informatique , avec le stockage et la virtualisation réseau qui sont devenus rapidement la norme pour la plupart des organisations. Ce modèle est vrai indépendamment du fait que l'infrastructure soit gérée en interne dans l’entreprise ou dans le Cloud. Etant donné que l'infrastructure devient hautement virtualisée et se dirige de plus en plus vers le cloud privé , les ressources informatiques traditionnelles doivent aussi évoluer au risque de devenir inutile.

    Découvrez comment Symantec peut vous aider à renforcer l'agilité du datacenter grâce à une infrastructure élastique, la mise en place d'un modèle de services et l'exploitation de l'intelligence informatique.

    •Améliorer l'élasticité de l’infrastructure
    •Fournir des ressources as-a-Service
    •Cultiver l’Intelligence informatique
  • Storage Foundation 6.2: Increasing application performance & High Availability Recorded: Feb 17 2015 55 mins
    Petter Sveum and Fernando Tavares
    Storage Foundation High Availability 6.2 Increases Performance, Efficiency & Flexibility in the Data Center

    Performance

    •Seamlessly adopt SSD/Flash on Solaris Sparc, AIX and VMware
    •Faster recovery of Cisco UCS service profiles and SAP applications

    Efficiency

    •Experience better ROI – realize up to 4X performance at up to 20% cost
    •Intelligent high-availability – Dynamic failover prioritization for virtual machines

    Flexibility

    •Combine ultra-fast DAS with next-generation interconnects
    •Experience near-local read and write performance to and from remote disks
  • How confident are you that your IT Systems will survive a Disaster? Recorded: Feb 3 2015 29 mins
    Fernando Tavares (Information Management Specialist)
    Managing mission-critical applications? Laying the foundation for a private cloud? Or simply working to meet your enterprise’s day-to-day technical and business demands? All require an infrastructure that’s flexible yet highly available and resilient.

    Follow this Webinar and learn how to:

    • Ensure critical data, applications, and complete systems are protected in the case of a disaster
    • Provide disaster recovery for production applications in virtual server environments
    • Deliver Disaster Recovery as a Service to different cloud platforms
    • Reduce the complexity of managing heterogeneous server and storage platforms
    • Reduce the costs of building and managing disaster recovery infrastructure
  • Définir la bonne architecture de stockage avec NetBackup 7.6 et les Appliances Recorded: Jan 8 2015 35 mins
    Olivier Ribouchon, Consultant Information Management, Symantec
    Depuis l'ère de la sauvegarde sur bande, votre choix de stockage secondaire n'a cessé de s'élargir : bande, disque, snapshots, cloud, appliances de déduplication. Lors de ce webcast, nous étudierons les bénéfices et limites de ces différents choix, les architectures actuelles (telles que disk-to-disk-to-tape), et les bonnes pratiques pour faire le bon choix en fonction de vos besoins et de votre gestion des coûts.
  • Mythes et croyances autour de la gestion de l'Information Recorded: Jan 8 2015 48 mins
    Frédéric Assuncao, Consultant Information Management, Symantec
    Les mythes et croyances liés à l'IT persistent depuis des années sans être remis en cause. Le postulat 'c'est comme cela que ça a toujours été' ne peut plus soutenir une décision IT ayant un impact négatif sur l'image, la santé et la performance de votre entreprise. Assistez à ce webcast pour en finir avec les fausses idées et découvrir comment mettre en place facilement une vraie stratégie de gestion de l’Information en tenant compte de son cycle de vie et à sa pertinence, grâce aux solutions d'archivage et d'e-discovery.
  • South for the Winter: Your Migration from Windows 2003 Recorded: Dec 3 2014 40 mins
    Barnaby Wood, Backup Lead, Symantec
    Windows 2003’s support life is coming to an end and, come July 2015, you will no longer get the help and support you need to keep functions running. But what does this mean? How will this affect you? What can and should you do?

    First, don’t panic! Second, join Barnaby Wood for this interactive webinar as he helps you to understand what this End of Support Life means, as well as identify areas of risk in your backup environment and provide an introduction to how you can get help to mitigate that risk, whether your choice is hardware and operating system upgrades, consolidation through server virtualization or continued use of Windows 2003
  • Backup Exec 2014 – Top Tips Recorded: Nov 6 2014 43 mins
    Barnaby Wood – Product Marketing; and Klaus Kresnik – Technical Lead
    Backup Exec 2014 delivered significant changes to drive performance, efficiency and usability improvements across physical and virtual environments. Join this webcast to understand what those changes are in more detail and to learn about the features and settings that Symantec’s technical teams use in configuring environments.

    After watching this webcast you will understand how to performance tune a Backup Exec environment and minimise data loss by protecting your data more frequently and recovering more effectively.
  • Transforming Your Data Center To Maximize Business Performance Recorded: Oct 23 2014 54 mins
    Petter Sveum and Fernando Tavares
    Symantec's data center portfolio is uniquely positioned to increase IT agility, thus helping customers realize the vision of an "Agile Data Center". Performance is a key element of agility. Considering the recent opinion by a leading storage vendor's CTO that "Tier-1 storage is now a capacity tier," it's time to evaluate whether your organization is investing resources in a storage infrastructure that cannot meet the flexibility and performance requirements of your critical applications

    Attend this Session and to discover:

    •How you can get Tier-0 performance at a Tier-3 price without putting your data at risk. Members of Symantec and Intel will demonstrate how Symantec Storage Foundation and Intel Solid State Devices can accentuate the value of direct-attached storage.

    •How to maximize your existing infrastructure without re-architecture.

    •How Symantec and Intel provide greater performance at a fraction of the cost of traditional SANs without impacting availability or data redundancy
  • Backup Exec 2014, Backup Appliances Recorded: Oct 16 2014 61 mins
    Maxim Tsvetaev, Leading Technical Consultant
    You are invited to attend this webinar to hear how the Backup Exec 2014 delivers powerful, flexible data protection and disaster recovery through a single, unified solution.

    During this webinar we will introduce you to the benefits of Backup Exec 2014 including:
    •Unified protection for virtual and physical environments
    •Powerful and flexible backup and recovery with improved performance
    •New platform and application support
    •Robust user interface to monitor and manage all your jobs from a single view
    •Faster upgrades and migration with minimal management
    •Simplified licensing and enhanced usability

    Also we will talk about Backup Appliances – integrated software and hardware solution that provides an easy, complete, and cost-effective backup of physical and virtual servers.
  • DRO - Symantec Disaster Recovery Orchestrator Recorded: Sep 25 2014 43 mins
    Fernando Tavares, Senior Product Marketing Manager, Anthony Austin, Azure Technical Solution Specialist
    Symantec™ Disaster Recovery Orchestrator enables customer to manage and automate the takeover and failback of Microsoft Windows-based applications residing on either physical or virtual machines (VMs) to the Microsoft Azure cloud.

    Join our webcast to find out how you can;
    • Minimise upfront and ongoing costs associated with DR in the cloud
    • Automate and simplify application takeovers and failbacks
    • Create a world where disaster recovery for Windows applications is only a click away
  • DRO - Symantec Disaster Recovery Orchestrator Recorded: Aug 12 2014 38 mins
    Fernando Tavares, Senior Product Marketing Manager
    Symantec™ Disaster Recovery Orchestrator enables customers to manage and automate the takeover and failback of Microsoft Windows-based applications residing on either physical or virtual machines (VMs) to the Microsoft Azure cloud.

    Join our webcast to find out how your customers can;
    • Minimise upfront and ongoing costs associated with DR in the cloud
    • Automate and simplify application takeovers and failbacks
    • Create a world where disaster recovery for Windows applications is only a click away
  • SYMANTEC SYMCAST: Introducing Backup Exec 2014 Recorded: Jul 9 2014 7 mins
    Kelly Cooley, Symantec Pre-Sales Consultant
    Welcome to the first of the Symantec Symcast webinars.

    The SymCast webinars are a series of free, on-demand playback webinars designed to give you a 10 -15 minute introduction to Symantec solutions. Each webinar will focus on how Symantec solutions can address common customer challenges.

    In this first webinar, learn how Backup Exec 2014 can help with the following:
    •Scale to protect both physical and virtual infrastructures
    •Efficiently backup and recover virtual platforms across VMware and HyperV
    •Manage growing data volumes and reduce storage costs
    •Simplify disaster recovery
    •Flexibly backup to multiple storage platforms including disk, tape and cloud
    •All with ease of management via the reintroduced job monitor and multi-server backup
  • Enterprise Vault 11.0 : archivage des messageries et mobilité Recorded: Jul 4 2014 49 mins
    Frédéric Assunçao, Spécialiste Archivage & eDiscovery
    Vous êtes toujours confrontés à l’augmentation du volume des données et du besoin d'accès de vos utilisateurs de n'importe quel terminal. Cela engendre des problématiques de performance de vos infrastructures, de gestion de la sauvegarde, de service aux utilisateurs, et de gouvernance.

    Symantec vous invite à découvrir comment la nouvelle version de sa solution d’archivage Symantec Enterprise Vault 11.0 peut répondre à vos enjeux.

    Lors de ce webcast, nos experts vous présenteront comment :
    -Mettre en place une stratégie d’’archivage des différentes plateformes de messagerie (Zimbra, Groupwise, Office 365, Gmail) : quels usages, quelles solutions, pour quels bénéfices
    -Améliorer l’expérience utilisateurs en leur permettant d’accéder aux archives de n'importe quel terminal d'entreprise (PC, smartphone, tablette)
  • Webinar Backup Exec 2014 Recorded: Jul 4 2014 76 mins
    Maxim Tsvetaev, Senior technical Consultant, TSS
    Уважаемые Коллеги!
    Приглашаем Вас принять участие в в вебинаре, посвященном обзору новых возможностей Backup Exec 2014.
    Новая версия программы Backup Exec 2014, представляет собой единое решение по защите критически важных данных организаций за счет мощного, гибкого резервного копирования и восстановления данных в различных гибридных физических и виртуальных средах.
    На online встрече, которая пройдет 20 июня, вы узнаете о новых функциональных возможностях Backup Exec 2014, включая:
    •до 100% более быстрое резервное копирование и восстановление данных,
    •интеграция с Windows Server 2012,
    •гранулярное восстановление Exchange 2013 и SharePoint 2013
    •более высокую прозрачность управления резервным копированием и восстановлением данных,
    •расширенную поддержку облачных вычислений и возможность непрерывной миграции и обновления данных
  • Backup Exec 2014 Launch Recorded: Jul 3 2014 49 mins
    Barnaby Wood, Senior Manager, Product Marketing
    Announcing the release of Backup Exec 2014, you are invited to attend this webinar to hear how the 2014 release delivers powerful, flexible data protection and disaster recovery through a single, unified solution. During this webinar we will introduce you to the benefits of Backup Exec 2014 including:
    •Unified protection for virtual and physical environments
    •Powerful and flexible backup and recovery with improved performance
    •New platform and application support
    •Robust user interface to monitor and manage all your jobs from a single view
    •Faster upgrades and migration with minimal management
    •Simplified licensing and enhanced usability
  • Backup Exec 2014 : la solution de protection de vos env. physiques et virtuels Recorded: Jul 2 2014 45 mins
    Séverin Desbuisson, Ingénieur Avant-Vente Information Management
    A l’occasion du lancement de la nouvelle version de Backup Exec 2014, nous vous invitons lors de ce webcast à découvrir les bénéfices d’une solution complète de protection et de restauration des données grâce aux dernières fonctionnalités :
    • protection unifiée des environnements virtuels et physiques,
    • sauvegardes et restaurations flexibles et performantes,
    • nouvelle plateforme et support des applications,
    • interface robuste pour gérer et administrer tous les jobs de façon centralisée,
    • mise à jour et migration facilitées,
    • mode de tarification simplifié .
Webcasts targeted to IT Professionals.
Webcast topics include Backup, Recovery, Storage, Data Protection, Disaster Recovery, Archiving and e-Discovery.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Simplifying your Backup Infrastructure with the Symantec Backup Exec 3600 Applia
  • Live at: Jul 19 2012 9:00 am
  • Presented by: Sharon White, Senior Manager, Product Marketing
  • From:
Your email has been sent.
or close
You must be logged in to email this