Video Screencast Help

Session Directory

Created: 02 May 2012 • Updated: 14 Nov 2012
Language Translations
LeslieMiller's picture
+3 3 Votes
Login to vote
ED 02 eDiscovery Breakout Reducing eDiscovery Cost and Risk with Intelligent Information Governance
ED 07 eDiscovery Breakout Avoiding eDiscovery Turbulence in the Cloud
ED 08 eDiscovery Breakout Customer Panel: Archiving and eDiscovery Best Practices from Real-World Cases
EM B01 Endpoint Management & Mobility Breakout What's New and What's Coming for ServiceDesk
EM B02 Endpoint Management & Mobility Breakout Getting to Know Asset Management Suite
EM B03 Endpoint Management & Mobility Breakout Next Generation Desktop: Persistence of Application Settings in Non-Persistent Environments
EM B04 Endpoint Management & Mobility Breakout Accelerate Your IT Management Suite 7.1 Migration: Best Practices for Architecture & Hardware
EM B06 Endpoint Management & Mobility Breakout Integrating Symantec Solutions with Workflow Templates
EM B07 Endpoint Management & Mobility Breakout Altiris Portfolio: State of the Union
EM B08 Endpoint Management & Mobility Breakout What Differentiates Symantec from the Management Pack
EM B09 Endpoint Management & Mobility Breakout Converting Data into Actionable Knowledge with IT Analytics Reporting
EM B10 Endpoint Management & Mobility Breakout Customer Panel: Leveraging Workflow to Automate IT
EM B11 Endpoint Management & Mobility Breakout Application Virtualization and Streaming:  Vendor Comparison
EM B12 Endpoint Management & Mobility Breakout VDI Client Management Best Practices
EM B13 Endpoint Management & Mobility Breakout Nuts and Bolts of Software Deployment
EM B14 Endpoint Management & Mobility Breakout Advanced Server Health Monitoring
EM B15 Endpoint Management & Mobility Breakout Embracing Apple in the Enterprise
EM B16 Endpoint Management & Mobility Breakout Managing in the Cloud
EM B17 Endpoint Management & Mobility Breakout Effectively Managing Heterogeneous Virtual Environments
EM B18 Endpoint Management & Mobility Breakout What's New in Deployment Solution 7.5
EM B19 Endpoint Management & Mobility Breakout Best-Practice Approach to Third-Party Patching
EM B20 Endpoint Management & Mobility Breakout Getting the Most out of Server Management
EM B21 Endpoint Management & Mobility Breakout Consumerization: What It Means to IT Operations
EM B22 Endpoint Management & Mobility Breakout Understanding Symantec's Approach to Software Asset Management
EM B23 Endpoint Management & Mobility Breakout Deploying Management and Security Agents to Mobile Devices
EM B24 Endpoint Management & Mobility Breakout Customer Session on Mobile Management
EM B25 Endpoint Management & Mobility Breakout Beyond Mobile Management - The Complete Solution to Enterprise Mobility
EM B26 Endpoint Management & Mobility Breakout Solving BYOD - Securing Apps and Enterprise Data on Personal Mobile Devices
EM B27 Endpoint Management & Mobility Breakout How to Create and Secure Your Mobile Infrastructure
EM B29 Endpoint Management & Mobility Breakout Application Virtualization Deep Dive: Taking Virtualization to the Next Level
EM B30 Endpoint Management & Mobility Breakout Customer Session: Automate Your Server Maintenance!
EM B31 Endpoint Management & Mobility Breakout Mobile Solutions by Use Case
EM L01 Endpoint Management & Mobility Lab Thinking Outside the Box with Complex Software Licensing
EM L02 Endpoint Management & Mobility Lab Using Workflow and Connector Solution to Import Data into Asset Management Suite
EM L03 Endpoint Management & Mobility Lab Using ServiceDesk Routing Rules and Portal Pages
EM L04 Endpoint Management & Mobility Lab Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows
EM L05 Endpoint Management & Mobility Lab Working with Change and Problem Management Using ITIL Best Practices
EM L06 Endpoint Management & Mobility Lab Using Workflow 7.1 to Build Automated IT Processes
EM L07 Endpoint Management & Mobility Lab Using IT Analytics as an Alternative Reporting Platform
EM L08 Endpoint Management & Mobility Lab Leveraging Symantec’s  Software Management Framework for Advanced Software Management
EM L09 Endpoint Management & Mobility Lab Keeping Operating Systems and Applications Up to Date with Patch Management 7.1
EM L10 Endpoint Management & Mobility Lab Best Practices for Implementing Deployment Solution
EM L11 Endpoint Management & Mobility Lab Best Practices for Policy Management in Client Management Suite
EM L12 Endpoint Management & Mobility Lab Best Practices for Policy Management in Server Management Suite
EM L13 Endpoint Management & Mobility Lab Preparing Applications to be Virtualized and Streamed
EM L14 Endpoint Management & Mobility Lab Deploying, Updating and Licensing Software with Symantec Management Solutions Part I
EM L15 Endpoint Management & Mobility Lab Deploying, Updating and Licensing Software with Symantec Management Solutions Part II
EM L16 Endpoint Management & Mobility Lab Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices
EM L17 Endpoint Management & Mobility Lab Introduction to Client Management Suite
EM L18 Endpoint Management & Mobility Lab Managing iOS and Android Mobile Devices with Symantec Mobile Management
EM L19 Endpoint Management & Mobility Lab Symantec Mobile Management and VeriSign Managed PKI
EM L20 Endpoint Management & Mobility Lab Introduction to Mobile
EM L21 Endpoint Management & Mobility Lab Cloud Enabled Management: Using Symantec Management Platform in the Cloud Securely (DMZ/Gateway/Remote Sites)
EM L23 Endpoint Management & Mobility Lab Implementing Client and Server Management with Site Services
EM PS Endpoint Management & Mobility Power Session Endpoint Management & Mobility Power Session
IM B01 Information Management Breakout Seven Backup and Recovery Best Practices Not to Be Missed
IM B02 Information Management Breakout NetBackup Appliances Technical Deep Dive
IM B03 Information Management Breakout Archiving On-Premise or In the Cloud: Which one is best for you?
IM B04 Information Management Breakout Avoiding Weekend Work: Simplifying eDiscovery for IT
IM B05 Information Management Breakout NetBackup Customer Panel Spotlight: Real-World Advice and Experiences with NetBackup
IM B06 Information Management Breakout Backup Exec 2012: Simplified Disaster Recovery
IM B07 Information Management Breakout Application Backup and Recovery Made Easy
IM B08 Information Management Breakout Backup is for Recovery; Archiving is for Discovery
IM B09 Information Management Breakout Best Practices for Backup and Recovery of VMware
IM B10 Information Management Breakout Got Big Data and Large DBs? Best Practices on How to Protect It with NetBackup
IM B11 Information Management Breakout Upgrading to NetBackup 7.5
IM B12 Information Management Breakout Can't Find It? Use NetBackup Search for eDiscovery and Legal Hold Across the Backup Infrastructure
IM B13 Information Management Breakout Changing Times, Changing IT Environments: Backup and Recovery in the Virtual Age
IM B15 Information Management Breakout Discover the Power of Your Virtual Environments with Backup Exec 2012
IM B17 Information Management Breakout Enterprise Vault Ask the Experts: Product Management Panel Discussion
IM B18 Information Management Breakout Enterprise Vault Speed Dating – Meet new and exciting content sources to archive!
IM B19 Information Management Breakout Backup Exec 2012: Revolutionizing Backup
IM B20 Information Management Breakout Introduction to the Backup Exec 2013 Cloud Storage Option: Back Up to the Cloud for Always-On Disaster Recovery
IM B21 Information Management Breakout Managing Data Growth and Storage Management with Backup Exec 2012
IM B22 Information Management Breakout Replication Director Unifies End-to-End Management of Snapshots and Backup
IM B23 Information Management Breakout What's New with NetBackup Appliances
IM B24 Information Management Breakout Enterprise Vault and Clearwell eDiscovery Platform: Real World ROI
IM B25 Information Management Breakout Stop Putting Tapes on Trucks! Configuring NetBackup Auto Image Replication for Automated Disaster Recovery
IM B26 Information Management Breakout Tales from the Vault: Enterprise Vault and Enterprise Vault.cloud Customer Panel
IM B27 Information Management Breakout The Backup Exec Yellow Brick Roadmap
IM B28 Information Management Breakout The Future of Archiving: Enterprise Vault Roadmap
IM B29 Information Management Breakout The Hangover 2.5: Waking Up to Exchange 2010 Archiving and eDiscovery Realities
IM B30 Information Management Breakout NetBackup Accelerator: Taking Your Backups to Ultrafast Lanes
IM B31 Information Management Breakout The Business Case to Deploy NetBackup Appliances and Deduplication Versus Other Approaches
IM B32 Information Management Breakout What’s New in NetBackup: The Vision and Roadmap
IM B33 Information Management Breakout The Backup Exec 3600 Appliance – Delivering Better Backup
IM B34 Information Management Breakout Why Upgrade to Enterprise Vault 10: Better Performance, Data Classification Services and Social Media Archiving
IM B36 Information Management Breakout Why You Should be Using NetBackup Bare Metal Restore (BMR) in Your DR Solution
IM B39 Information Management Breakout NetBackup OpenStorage Partner Ecosystem
IM B40 Information Management Breakout Why Should You Be Using OpsCenter and OpsCenter Analytics?
IM B41 Information Management Breakout The New Era of Information Governance: How Legal and IT can Work Together to Reduce Cost and Risk
IM B42 Information Management Breakout Cloud-Based Disaster Recovery – Be Prepared for Anything!
IM B43 Information Management Breakout NetBackup 7.5 Catalog Migration Considerations
IM L01 Information Management Lab Application Protection for VMware Virtual Machines
IM L02 Information Management Lab Archive to the Cloud: Hands-On Experience with Enterprise Vault.cloud
IM L03 Information Management Lab Archiving SharePoint and File Servers with Enterprise Vault
IM L04 Information Management Lab Auto Image Replication: A Hands-On Experience
IM L05 Information Management Lab Backup Exec 2012 Simplified Disaster Recovery
IM L06 Information Management Lab NetBackup Replication Director: A Hands-On Experience
IM L07 Information Management Lab Configuring Enterprise Vault Data Classification Services
IM L08 Information Management Lab NetBackup Appliances: Configuration and Deployment Use Cases
IM L09 Information Management Lab Enterprise Vault Outlook 2010 Client Configuration and Best Practices (Includes Virtual Vault)
IM L10 Information Management Lab Backup Exec 2012 New User Experience
IM L11 Information Management Lab Hands on with NetBackup 7.5 for Vmware
IM L13 Information Management Lab Backup Exec 2012 Enhanced Virtual Environment Support
IM L14 Information Management Lab OpsCenter and OpsCenter Analytics for NetBackup 7.5 Part 1
IM L15 Information Management Lab OpsCenter and OpsCenter Analytics for NetBackup 7.5 Part 2
IM L16 Information Management Lab Symantec Operations Readiness Tools (SORT)
IM L17 Information Management Lab The Clearwell eDiscovery Platform: Identification and Collection
IM L18 Information Management Lab Backup Exec 2012 Performance Optimization
IM L19 Information Management Lab Backup Exec 2012 Integrated Virtual Conversions
IM L20 Information Management Lab Hands-On with NetBackup for VMware
IM PS Information Management Power Session Live and Let Die: 007’s Guide to Dominating Data X.Plosion with virtualization, dedupe, backup, archiving, and eDiscovery.
SM B01 Storage Management & High Availability Breakout Storage Foundation Strategy and Futures
SM B02 Storage Management & High Availability Breakout High Availability Strategy and  Futures
SM B03 Storage Management & High Availability Breakout Veritas Operations Manager and Data Insight Strategy and Futures
SM B05 Storage Management & High Availability Breakout Analyst Session:  Best Practices for High Availability and Disaster Recovery
SM B06 Storage Management & High Availability Breakout Deep Dive: Storage Foundation Performance and Tuning on UNIX and Linux
SM B07 Storage Management & High Availability Breakout Managing Multi-Tier Application Availability and Orchestration with Virtual Business Services in the data centre or the cloud
SM B08 Storage Management & High Availability Breakout Improve VMware Storage Performance, Reliability and Reporting with Dynamic Multi-Pathing
SM B09 Storage Management & High Availability Breakout ApplicationHA: Maximize Application Availability and Manageability in Virtual Environments
SM B10 Storage Management & High Availability Breakout Rethink Disaster Recovery: Replication and Backup Are Not Enough
SM B11 Storage Management & High Availability Breakout Bulletproof Your Linux Environment
SM B12 Storage Management & High Availability Breakout Deep Dive: Veritas Cluster Server 6.0 New Features and Capabilities
SM B13 Storage Management & High Availability Breakout Data Insight: Improve Unstructured Data Governance through Insights into Data Ownership and Usage
SM B14 Storage Management & High Availability Breakout All the Features of Storage Foundation That You Don’t Know About But Should Be Using to Get the Most Out of Your Storage Investment
SM B15 Storage Management & High Availability Breakout Deep Dive: Cluster File System 6.0 New Features and Capabilities
SM B16 Storage Management & High Availability Breakout Veritas Operations Manager Advanced: The Swiss Army Knife of the Data Center
SM B17 Storage Management & High Availability Breakout Deep Dive: Fast Failover, Disaster Recovery and Storage Optimization in Windows Physical and Virtual Environments
SM B18 Storage Management & High Availability Breakout Everything You Need to Know About Oracle and Storage Foundation High Availability
SM B19 Storage Management & High Availability Breakout Top Support Cases and How to Prevent The Need to Call in to Support
SM L01 Storage Management & High Availability Lab See It, Control It, Keep it Highly Available. Don’t Lose Sight of Your Application Deployed on Vmware
SM L02 Storage Management & High Availability Lab Data Insight: Identify Data Owners and Promote Accountability
SM L03 Storage Management & High Availability Lab Veritas Operations Manager: Get the Most From Your Storage Foundation and Veritas Cluster Server Investment
SM L04 Storage Management & High Availability Lab Veritas Operations Manager Advanced: Optimize Your Heterogeneous Storage Environment
SM L05 Storage Management & High Availability Lab Shift into the Fast Lane: Faster Detection and Fast Recovery of Your Windows Application
SM L06 Storage Management & High Availability Lab Veritas Cluster Server High Availability and Disaster Recovery
SM L07 Storage Management & High Availability Lab Dynamic Multi-Pathing for VMware
SM L08 Storage Management & High Availability Lab Enhanced Primary Storage Compression and De-duplication on UNIX and Linux with Storage Foundation 6.0
SM L09 Storage Management & High Availability Lab How to Set Up, Configure and Manage Veritas Cluster Server Virtual Business Services Across a Multi-Tier Application Deployment
SM PS Storage Management & High Availability Power Session It’s About Your Game, Not Your Gear: Storage and Availability Management Group Strategy and Futures
SR B01 Security & Risk Management Breakout Forrester Research:  Framework for Achieving Fast ROI with Symantec Protection Suite Enterprise Edition
SR B02 Security & Risk Management Breakout Balancing Business Agility and IT Risk in Today’s Evolving IT Environments
SR B03 Security & Risk Management Breakout The Malicious Insider and Data Loss:  How to Read the Writing on the Wall
SR B04 Security & Risk Management Breakout Leave it to the Experts:  How to Implement and Manage Data Loss Prevention
SR B05 Security & Risk Management Breakout Your Email Is Outsourced to the Cloud and Is Mobile, Are You Protecting It with Encryption?
SR B06 Security & Risk Management Breakout Roadmap:  The Future of Encryption at Symantec
SR B07 Security & Risk Management Breakout Defeating Advanced Authentication Threats with Device, Behavior and Reputation Analysis
SR B08 Security & Risk Management Breakout PKI is Alive and Well:  The Growing Use of Certificates for Enterprise Authentication
SR B09 Security & Risk Management Breakout Maximize Your Protection Suite ROI with Symantec Web Gateway to Protect Against the Latest Threats
SR B10 Security & Risk Management Breakout Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0
SR B11 Security & Risk Management Breakout Symantec Protection Engine:  for Cloud Services and Storage
SR B12 Security & Risk Management Breakout Security Insights at Your Fingertips:  Symantec Protection Center.mobile Overview
SR B13 Security & Risk Management Breakout Best Practices for Building and Maintaining a World-Class Security Operations Team
SR B14 Security & Risk Management Breakout Adding Content Awareness to Your Incident Management Program
SR B16 Security & Risk Management Breakout Adding Security Intelligence to Your Existing Solutions for Enhanced Protection
SR B17 Security & Risk Management Breakout The Threat Landscape Continues to Change.  How Are You Keeping Pace?
SR B18 Security & Risk Management Breakout The Future Directions for Symantec Threat and Risk Management Solutions
SR B19 Security & Risk Management Breakout Symantec Endpoint Protection 12 Customer Panel: Ford Motor Company and Varian Medical Systems
SR B20 Security & Risk Management Breakout Symantec Endpoint Protection 12: Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently
SR B21 Security & Risk Management Breakout Case Studies: Meeting Server Compliance Requirements and Applying Proactive Prevention with Symantec Critical System Protection
SR B22 Security & Risk Management Breakout Stop Server Incursions and Unauthorized Access:  How to Defend Against Common APT Attacks
SR B23 Security & Risk Management Breakout The Roadmap for Symantec Infrastructure Protection Products
SR B24 Security & Risk Management Breakout Android OS: Securing the Most Popular Open Source Platform in the Enterprise
SR B25 Security & Risk Management Breakout Symantec.cloud Security Solutions: Expert Insights into Email, Web, Endpoint and IM Security Best Practices
SR B26 Security & Risk Management Breakout Find Botnets and Other Malware Using the Malicious Activity Assessment
SR B27 Security & Risk Management Breakout SONAR, Insight, Skeptic and GIN - The Symantec Secret Sauce
SR B28 Security & Risk Management Breakout Securing Your Virtual Data Centers:  The Future of Endpoint and Server Security
SR B29 Security & Risk Management Breakout The Power of Symantec Integration: Ultimate Endpoint Security
SR B30 Security & Risk Management Breakout A Look Inside O3: Symantec's New Cloud Security Platform
SR B31 Security & Risk Management Breakout Making Your Enterprise SSL Security Less of a Gamble
SR B32 Security & Risk Management Breakout Privacy and Security in the Age of Meaningful Use
SR B33 Security & Risk Management Breakout Identifying Threats and Prioritizing Response with Managed Security Services
SR B34 Security & Risk Management Breakout Symantec DLP: Detection Innovation and Expanded Coverage
SR L01 Security & Risk Management Lab Get Deep with Data Loss Prevention
SR L02 Security & Risk Management Lab Integrated DLP, Encryption and User Authentication: A Day in the Life of Protecting Your Enterprise Data
SR L03 Security & Risk Management Lab Understanding Risk with CCS 11: A Deep Dive Into Risk Manager
SR L05 Security & Risk Management Lab Security Insights at Your Fingertips: Symantec Protection Center.mobile
SR L06 Security & Risk Management Lab Migrating to Symantec Endpoint Protection 12.1
SR L07 Security & Risk Management Lab Configuring Protection Technologies with Symantec Endpoint Protection 12.1
SR L08 Security & Risk Management Lab Troubleshooting Symantec Endpoint Protection 12.1
SR L09 Security & Risk Management Lab Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together
SR L10 Security & Risk Management Lab Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration
SR L11 Security & Risk Management Lab Maximize the Value of Symantec Protection Suite: How to Protect Against Web-Borne Malware and Identify Active Malware
SR L12 Security & Risk Management Lab Symantec Protection Suite Enterprise Edition  Hands-On Lab: Achieving Savings Outlined in Forrester Research ROI Study
SR L13 Security & Risk Management Lab Protecting Data with PGP Whole Disk Encryption
SR L14 Security & Risk Management Lab PGP NetShare: Shared File and Folder Encryption
SR L15 Security & Risk Management Lab Protecting Corporate Networks with Symantec Validation and ID Protection
SR L16 Security & Risk Management Lab Transparently Authenticating Tablets, Smartphones, and Laptops with Symantec Managed PKI Service
SR L17 Security & Risk Management Lab Deep Dive on Symantec Control Compliance Suite 11.0
SR L19 Security & Risk Management Lab Deep Dive: Email Security.cloud Management
SR L20 Security & Risk Management Lab Web Security.cloud Management Best Practices
SR L21 Security & Risk Management Lab Protect Servers and Defend Against APTs with Symantec Critical System Protection
SR L22 Security & Risk Management Lab Lock Down a Virtual Environment with Symantec Critical System Protection
SR PS Security & Risk Management Power Session Crimes of Opportunity and Risk Orientation: Redefining Security Leadership
ST B01 Strategic Insights Breakout The Big, Changing Picture of IT and How to Protect It
ST B02 Strategic Insights Breakout Breaking news! News, insights, and strategies from Symantec thought leaders in cloud computing.
ST B03 Strategic Insights Breakout Mobile Threat Panel Discussion: What’s the Real Risk?
ST B04 Strategic Insights Breakout Virtualization Panel Discussion: The Trends Within the Trend
ST B05 Strategic Insights Breakout On-Premise – Cloud – Or Managed Service – Making The Most Of Information Management Technology & People
ST B06 Strategic Insights Breakout Insights in Building a Private Cloud: The Story of Granite Labs
ST B07 Strategic Insights Breakout Finding the Gateway to Cloud Security

SPONSOR SESSIONS:

SS B01 Sponsor Intel: Intel and Symantec: Improving performance, security, manageability and data protection
SS B02 Security & Risk Management Sponsor Intel: Information at Risk: Proven Strategies to Avoid Breaches Using Solutions from Intel and Symantec
SS B03 Security & Risk Management Sponsor Intel: Chipping away at Cybercrime: Protect your Enterprise Utilizing Intel® and Symantec Solutions for Stronger Identity Protection
SS B04 Information Management Sponsor Enterprise Computing in a Virtual Private Cloud
SS B05 Storage Management & High Availability Sponsor HP: Symantec, HP & VMware: Successfully Virtualizing Tier 1 Microsoft Applications with HP ProLiant Blades, Servers and Storage.
SS B06 Security & Risk Management Sponsor Journey To Your Secure Enterprise: a Risk Managed Approach
SS B07 Storage Management & High Availability Sponsor Fujitsu: Reshaping Data Protection: What we learned from the March 11, 2011 disaster in Japan and what that means for your data center
SS B08 Information Management Sponsor Fujitsu: Reshaping Data Protection – Eliminating boundaries to address data explosion challenges
SS B09 Information Management Sponsor EMC Data Domain for Archiving – Are You Kidding?
SS B10 Information Management Sponsor Vault Solutions: Unix Archiving for Enterprise Vault – at long last!
SS B11 Information Management Sponsor IBM Expert Integrated Systems and IBM ProtecTIER and Netbackup OpenStorage
SS B13 Security & Risk Management Sponsor The Virtualization Security Journey: Beyond Endpoint Security with VMware and Symantec
SS B14 Security & Risk Management Sponsor The Virtualization Journey: Managing and Proving Compliance with VMware and Symantec
SS B15 Security & Risk Management Sponsor RedSeal Networks: Security Architecture: Coordinating Your Defenses
SS B16 Information Management Sponsor Sepaton: Fast, Flexible Replication for Enterprise-Wide Disaster Recovery: SEPATON and OST with Automatic Image Replication
SS B17 Information Management Sponsor IBM: Seeing through the clouds: the challenges and opportunities to delivering business resilience in the cloud
SS B18 Security & Risk Management Sponsor Accenture: Accenture and Symantec: Protecting Your Critical Information and Enabling Business Value
SS B19 Information Management Sponsor Techniques for optimizing total solution performance