Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Vision 2012 EMEA Session Directory

Created: 26 Oct 2012 • Updated: 05 Dec 2012 | 4 comments
Language Translations
LeslieMiller's picture
+5 5 Votes
Login to vote

Session titles will be linked to the presentations as they become available. Not all sessions will be available. Video presentations are marked with a video icon. Registration is required for most downloads.


Session ID Track Type Title
BC PS Business Critical Services Power Session Value Realization with Symantec Technology Services
EM B01 Endpoint and Mobile Management Breakout Managing Images and OS Deployments in the new Paradigm using Deployment Solution 7.5
EM B02 Endpoint and Mobile Management Breakout Maximize your Private Cloud benefit with Server Management Suite
EM B03 Endpoint and Mobile Management Breakout Endpoint Management: State of the Union and Vision
EM B04 Endpoint and Mobile Management Breakout Intelligent Software and App Distribution
EM B05 Endpoint and Mobile Management Breakout Embracing and Managing Apple as an Enterprise solution
EM B06 Endpoint and Mobile Management Breakout Getting the maximum ROI from your Hardware and Software using Asset Management Suite
EM B07 Endpoint and Mobile Management Breakout Ensuring the value of your Applications in non-persistent Desktop environments
EM B09 Endpoint and Mobile Management Breakout Solving BYOD - Securing Apps and Enterprise Data on Personal Mobile Devices
EM B10 Endpoint and Mobile Management Breakout Providing true end to end Solution Automation using Symantec Workflow templates
EM B12 Endpoint and Mobile Management Breakout Ensuring effective Service Management with ServiceDesk
EM B13 Endpoint and Mobile Management Breakout VDI Client Management Best Practices
EM B14 Endpoint and Mobile Management Breakout Customer Session III - Northgate Managed Services
EM B15 Endpoint and Mobile Management Breakout Deploying Management and Security Agents to Mobile Devices
EM B16 Endpoint and Mobile Management Breakout Managing Outside the Firewall and Learn What Is New In Altiris ITMS 7.5
EM B19 Endpoint and Mobile Management Breakout Accelerate Your IT Management Suite 7.1/7.5 Migration: Best Practices for Architecture & Hardware
EM B20 Endpoint and Mobile Management Breakout Apple iOS and Google Android Technical Overview
EM B21 Endpoint and Mobile Management Breakout Customer Session I - Client Management Suite at Oxford University
EM B22 Endpoint and Mobile Management Breakout Customer Session II - IT Management Suite and Endpoint Protection at CSR
EM IS PS Endpoint and Mobile Management Power Session Strategies for Security and Management in a Mobile and Virtual World
EM L01 Endpoint and Mobile Management Lab Introduction to Mobile
EM L02 Endpoint and Mobile Management Lab Best Practices for Implementing Deployment Solution
EM L03 Endpoint and Mobile Management Lab Best Practices for Policy Management in Client Management Suite
EM L04 Endpoint and Mobile Management Lab Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices
EM L05 Endpoint and Mobile Management Lab Managing iOS and Android Mobile Devices with Symantec Mobile Management
EM L07 Endpoint and Mobile Management Lab Thinking Outside the Box with Complex Software Licensing
EM L08 Endpoint and Mobile Management Lab Using Workflow and Connector Solution to Import Data into Asset Management Suite
EM L09 Endpoint and Mobile Management Lab Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows
EM L10 Endpoint and Mobile Management Lab Using Workflow 7.1 to Build Automated IT Processes
EM L11 Endpoint and Mobile Management Lab Leveraging Symantec’s  Software Management Framework for Advanced Software Management
EM L12 Endpoint and Mobile Management Lab Symantec Mobile Management and VeriSign Managed PKI
EM L13 Endpoint and Mobile Management Lab Preparing Applications to Be Virtualized and Streamed
IM B01 Information Management Breakout The Future of Archiving & eDiscovery:  Enterprise Vault, Enterprise Vault.cloud & Clearwell Roadmap
IM B02 Information Management Breakout Making My Life Easier With Enterprise Vault: Technical Deep Dive Into New Features of the Archiving Roadmap
IM B03 Information Management Breakout Ask the Experts: Archiving & eDiscovery Product Management Panel Discussion
IM B04 Information Management Breakout Exchange Archiving and eDiscovery Realities
IM B05 Information Management Breakout The Road to Intelligent Information Governance: Reducing eDiscovery Cost and Risk
IM B06 Information Management Breakout Archiving On-Premise or in the Cloud:  Which Option Is Best for You?
IM B07 Information Management Breakout Managing the Data Explosion: Solving SharePoint, Social Media and File System Growth and eDiscovery Challenges
IM B08 Information Management Breakout NetBackup Appliances Technical Deep Dive
IM B09 Information Management Breakout Best Practices for Backup and Recovery of VMware
IM B10 Information Management Breakout Got Big Data and Large DBs? Best Practices on How to Protect It with NetBackup
IM B11 Information Management Breakout Upgrading to the Latest NetBackup Release
IM B12 Information Management Breakout Can't Find It? Use NetBackup Search for eDiscovery and Legal Hold Across the Backup Infrastructure
IM B13 Information Management Breakout Replication Director Unifies End-to-End Management of Snapshots and Backup
IM B14 Information Management Breakout What's New with NetBackup Appliances
IM B15 Information Management Breakout Still Putting Tapes on Trucks?  New adventures in Automated Disaster Recovery
IM B16 Information Management Breakout NetBackup Accelerator: Taking Your Backups to Ultrafast Lanes
IM B17 Information Management Breakout The Business Case to Deploy NetBackup Appliances and Deduplication Versus Other Approaches
IM B18 Information Management Breakout What’s New in NetBackup: The Vision and Roadmap
IM B19 Information Management Breakout Cloud-Based Disaster Recovery – Be Prepared for Anything!
IM B20 Information Management Breakout The Power of 7: Backup Exec’s Best Practices Not to be Missed
IM B21 Information Management Breakout Backup Exec 2012: Simplified Disaster Recovery
IM B22 Information Management Breakout Application Backup and Recovery Made Easy with Backup Exec 2012
IM B23 Information Management Breakout Discover the Power of Your Virtual Environments with Backup Exec 2012
IM B24 Information Management Breakout Backup Exec 2012: Revolutionizing Backup
IM B25 Information Management Breakout The Backup Exec Yellow Brick Roadmap
IM B26 Information Management Breakout The Backup Exec 3600 Appliance – Delivering Better Backup
IM L01 Information Management Lab Making My Life Easier: Hands-On Experience with Enterprise Vault.cloud
IM L02 Information Management Lab Making My Life Easier: Hands-On Experience with Enterprise Vault
IM L04 Information Management Lab Making My Life Easier: Hands-On Experience with Making My Life Easier: Hands-On Experience with The Symantec Clearwell eDiscovery Platform
IM L06 Information Management Lab Application Protection for VMware Virtual Machines
IM L07 Information Management Lab Auto Image Replication: A Hands-On Experience
IM L08 Information Management Lab NetBackup Replication Director: A Hands-On Experience
IM L09 Information Management Lab NetBackup Appliances: Configuration and Deployment Use Cases
IM L10 Information Management Lab Hands on with the latest release of NetBackup for Vmware
IM L12 Information Management Lab Backup Exec 2012 Simplified Disaster Recovery
IM L13 Information Management Lab Backup Exec 2012 New User Experience
IM L14 Information Management Lab Backup Exec 2012 Enhanced Virtual Environment Support
IM L15 Information Management Lab Backup Exec 2012 Performance Optimization
IM PS Information Management Power Session Information Never Dies: Controlling the Data Explosion through Information Management, Intelligence & Governance
IS B01 Information Security and Risk Management Breakout Defeating Advanced Authentication Threats with Device, Behavior and Reputation Analysis
IS B02 Information Security and Risk Management Breakout The Device has left the Building: Mobile Security made easy with PKI
IS B03 Information Security and Risk Management Breakout Look Inside O3: Symantec's New Cloud Security Platform
IS B04 Information Security and Risk Management Breakout Symantec Endpoint Protection 12 Customer Panel: Customer Experiences of Migration to SEP 12 and the Benefits It Has Since Brought
IS B05 Information Security and Risk Management Breakout Symantec Endpoint Protection 12:  Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently
IS B06 Information Security and Risk Management Breakout 97% of Stolen Data Is From Servers: Stop Unauthorised Access and Defend Against APT and Targeted Attacks
IS B07 Information Security and Risk Management Breakout The Roadmap for Symantec Infrastructure Protection Products
IS B08 Information Security and Risk Management Breakout The Anatomy of Modern Attacks
IS B09 Information Security and Risk Management Breakout SONAR, Insight, Skeptic and GIN - The Symantec secret sauce
IS B10 Information Security and Risk Management Breakout Securing Your Virtual Data Centres:  The Future of Endpoint and Server Security
IS B11 Information Security and Risk Management Breakout Demo: Integrating Symantec Products to Get the Ultimate Protection
IS B12 Information Security and Risk Management Breakout Messaging security deployment options - which is really best for you?
IS B13 Information Security and Risk Management Breakout Web security deployment options - which is really best for you?
IS B14 Information Security and Risk Management Breakout Are you getting the most from Symantec Protection Suite?
IS B15 Information Security and Risk Management Breakout Balancing Business Agility and IT Risk in Today’s Evolving IT Environments - CISO Panel Session
IS B16 Information Security and Risk Management Breakout The Future Directions for Symantec Risk and Compliance Solutions
IS B17 Information Security and Risk Management Breakout Making Your Enterprise SSL Security Less of a Gamble
IS B18 Information Security and Risk Management Breakout Adding Security Intelligence to Your Existing Solutions for Enhanced Protection
IS B19 Information Security and Risk Management Breakout Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!
IS B20 Information Security and Risk Management Breakout The Malicious Insider and Data Loss:  How to Read the Writing on the Wall
IS B21 Information Security and Risk Management Breakout Leave it to the Experts:  How to Implement and Manage Data Loss Prevention
IS B22 Information Security and Risk Management Breakout Your Email Is Outsourced to the Cloud and is Mobile, Are You Protecting It with Encryption?
IS B23 Information Security and Risk Management Breakout Roadmap: The Future of Encryption at Symantec
IS B24 Information Security and Risk Management Breakout Integrated DLP, Encryption and User Authentication:  A Day in the Life of Protecting Your Enterprise Data
IS B25 Information Security and Risk Management Breakout Symantec Security Information Manager (SIM)
IS B26 Information Security and Risk Management Breakout Risk Management Dashboard at Your Fingertips: Symantec Protection Center Mobile Overview
IS B27 Information Security and Risk Management Breakout Symantec Protection Engine: gives almost any application or operating system the ability to scan for threats
IS L01 Information Security and Risk Management Lab Transparently Authenticating Tablets, Smartphones and Laptops with Symantec Managed PKI Service
IS L02 Information Security and Risk Management Lab Migrating to Symantec Endpoint Protection 12.1 from an earlier version or another vendor's product
IS L03 Information Security and Risk Management Lab Securing Virtualised Endpoints
IS L04 Information Security and Risk Management Lab Troubleshooting Symantec Endpoint Protection 12.1
IS L05 Information Security and Risk Management Lab Integrating Messaging Gateway, Encryption and Data Loss Prevention: three great things that are even better together
IS L06 Information Security and Risk Management Lab Protect servers and defend against APTs with Symantec Critical System Protection
IS L07 Information Security and Risk Management Lab Lock down your virtual environment with Symantec Critical System Protection
IS L08 Information Security and Risk Management Lab CCS 11 Lab Part 1: Deep Dive: Symantec Control Compliance Suite 11.0
IS L09 Information Security and Risk Management Lab CCS 11 Lab Part 2: Understanding Risk -  A Deep Dive Into Risk Manager
IS L10 Information Security and Risk Management Lab Understand and Using the MSS & Deepsight Portal
IS L11 Information Security and Risk Management Lab Get Deep with Data Loss Prevention
IS L13 Information Security and Risk Management Lab Protecting Data with PGP Whole Disk Encryption
SA B01 Storage and Availability Management Breakout Storage Foundation Strategy and Futures
SA B02 Storage and Availability Management Breakout High Availability Strategy and Futures
SA B03 Storage and Availability Management Breakout Veritas Operations Manager (VOM) and Data Insight Strategy and Futures
SA B04 Storage and Availability Management Breakout Business Critical VIrtualization for VMware; Improve Availability and Storage Performance
SA B05 Storage and Availability Management Breakout HyperVisor Wars: Are You Paying Too Much for VMware?
SA B06 Storage and Availability Management Breakout Hot Storage Trends: What Symantec is Doing with Big Data and Solid State Drives
SA B07 Storage and Availability Management Breakout Deep Dive: All the Features of Storage Foundation You Don’t Know About, But Should to Get the Most Out of Your Storage Investment
SA B08 Storage and Availability Management Breakout Managing Multi-Tier Application Availability and Orchestration with Virtual Business Service
SA B09 Storage and Availability Management Breakout Rethink Disaster Recovery: Replication and Backup Are Not Enough
SA B10 Storage and Availability Management Breakout Bullet Proof Your Linux Environment
SA B11 Storage and Availability Management Breakout Deep Dive: Veritas Cluster Server 6.0 New Features and Capabilities
SA B12 Storage and Availability Management Breakout Data Insight: Improve Unstructured Data Governance Through Insights Into Data Ownership and Usage
SA B13 Storage and Availability Management Breakout Deep Dive: Cluster File System 6.0 New Features and Capabilities
SA B14 Storage and Availability Management Breakout Veritas Operations Manager Advanced: the Swiss Army Knife of the Data Center
SA B15 Storage and Availability Management Breakout Deep Dive: Storage Optimization and High Availability in evolving Windows data center with Hyper-V, SSD, and Windows 8
SA B16 Storage and Availability Management Breakout Everything You Need to Know About Oracle and Storage Foundation High Availability
SA B17 Storage and Availability Management Breakout Deep Dive: Storage Foundation Performance and Tuning on UNIX and Linux
SA L01 Storage and Availability Management Lab Clustering and Application control on VMware with no limitations! Learn how to best use VCS and ApplicationHA in VMware
SA L01 Storage and Availability Management Lab Clustering and Application control on VMware with no limitations! Learn how to best use VCS and ApplicationHA in VMware
SA L02 Storage and Availability Management Lab Data Insight: Identify Data Owners and Promote Accountability
SA L03 Storage and Availability Management Lab Veritas Operations Manager 5.0: Get the Most From Your Storage Foundation and Veritas Cluster Server Investment
SA L04 Storage and Availability Management Lab Create enterprise grade storage and availability platform for Hyper-V with Veritas Storage Foundation High Availability for Windows 6.0
SA L06 Storage and Availability Management Lab Veritas Operations Manager Advanced 5.0: Unlock your storage secrets with advanced reporting and remediation
SA L07 Storage and Availability Management Lab How to Setup, Configure and Manage Veritas Cluster Server's Virtual Business Services Across a Multi-Tier Application Deployment
SA L08 Storage and Availability Management Lab Hands-on learning for Storage Foundation Compression and Deduplication for Enhanced Storage Management
SA PS Storage and Availability Management Power Session Relentless: The Data Center that Just Won’t Quit
SS B01 Sponsor Session Breakout Intel: Intel and Symantec: Improving performance, security, manageability and data protection
SS B02 Sponsor Session Breakout Intel: Chipping away at Cybercrime: Protect your Enterprise Utilizing  Intel and Symantec Solutions for Stronger Identity Protection
SS B03 Sponsor Session Breakout Intel: Information at Risk: Proven Strategies to Avoid Breaches Using Solutions from Intel and Symantec
SS B04 Sponsor Session Breakout HP: A Community of Purpose: Managed Security ServicesA Community of Purpose: Managed Security Services
SS B05 Sponsor Session Breakout HP: Applying Managed Security Services in an Enterprise Cloud Environment
SS B06 Sponsor Session Breakout HP: Effective Security Spending:   Better metrics allow intelligent spending on security that matters
SS B07 Sponsor Session Breakout Deloitte: Cyber Incident Advice & Response
SS B08 Sponsor Session Breakout Deloitte: Mobile Security: Enabling consumerisation
SS B09 Sponsor Session Breakout Fujitsu: Reshaping Data Protection: How Fujitsu ETERNUS Storage,  Symantec NetBackup and Symantec Enterprise Vault help you overcome today’s Data Protection challenges
SS B10 Sponsor Session Breakout Fujitsu: Reshaping IT: Why Fujitsu’s Global Cloud platform and Symantec.cloud provide the safest and most flexible global cloud solution
SS B11 Sponsor Session Breakout VMWare: The Virtualization Security Journey: Beyond Endpoint Security with VMware and Symantec
SS B12 Sponsor Session Breakout VMWare: The Virtualization Journey: Managing and Proving Compliance with VMware and Symantec
SS B13 Sponsor Session Breakout Red Hat: Red Hat Enterprise Linux Server - Open source platform for mission-critical computing
SS B14 Sponsor Session Breakout Red Hat: Why migrate from UNIX to Red Hat Enterprise Linux
SS B15 Sponsor Session Breakout Accenture: Accenture and Symantec: Protecting Your Critical Information and Enabling Business Value
SS B16 Sponsor Session Breakout Computacenter: Tighten Up your data recovery with Computacenter – The next dimension
SS B17 Sponsor Session Breakout Echoworx: Decrypting the Encryption Scam!
SS B19 Sponsor Session Breakout IBM: Seeing through the clouds: the challenges and opportunities to delivering business resilience in the cloud
SS B20 Sponsor Session Breakout OBS: Mobility, Identity, Cloud : How the new uses (practices) are leading enterprises to rethink their IT
SS B21 Sponsor Session Breakout Microsoft Breakout Session
ST B01 Strategic Technologies Breakout Managing the Telco super themes in 2012 and beyond -  The Symantec Strategy and Solutions for Communications Service Providers
ST B02 Strategic Technologies Breakout Profiting from the Cloud: New revenue streams with Security and Information Protection services
ST B03 Strategic Technologies Breakout Mobile Security and Management in the Telco industry
ST B04 Strategic Technologies Breakout The power of the combined Symantec & Norton portfolio for Telcos: The joint Symantec Enterprise & Norton Consumer value proposition
ST B05 Strategic Technologies Breakout Symantec Reference Architecture for Business Critical Virtualization
ST B07 Strategic Technologies Breakout Beyond Mobile Management - The Complete Solution to Enterprise Mobility
ST B08 Strategic Technologies Breakout Mitigating security risks in Industrial Control Systems and Smart Meter deployments
ST B09 Strategic Technologies Breakout On-Premise – Cloud – Or Managed Service –Make Most of Technology & People
ST B10 Strategic Technologies Breakout Cloud 2.0: The Future of the Cloud