Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Vision 2013 Las Vegas Session Directory

Created: 12 Apr 2013 • Updated: 28 May 2013
Language Translations
LeslieMiller's picture
+7 7 Votes
Login to vote

Session titles will be linked to the presentations as they become available. Not all sessions will be available. Video presentations are marked with a video icon.

Session ID Track Type Title
IA B01

Information Availability

Breakout Business Critical Virtualization for VMware: Solving the Application and Storage Availability Puzzle
IA B02

Information Availability

Breakout A Tiered Approach to Business Continuity: Learn how Storage Foundation, Veritas Cluster Server, Applicaton HA and NetBackup Deliver SLA-based Business Continuity
IA B03

Information Availability

Breakout Becoming Proactive on High Availability and Disaster Recovery Readiness
IA B04

Information Availability

Breakout Scale-out, High-Performance Cluster File Server Using RDMA Over Infiniband/40gigE
IA B05

Information Availability

Breakout Deep Dive: Storage Foundation Performance and Tuning on UNIX and Linux 
IA B06

Information Availability

Breakout Deep Dive: Veritas Cluster Server Features and Capabilities
IA B07

Information Availability

Breakout Data Insight: Shed Light on the Dark Data in Your Enterprise
IA B08

Information Availability

Breakout Deep Dive: Blow Up I/O Logjams in Virtualized Environments Without Explosives
IA B09

Information Availability

Breakout Fast, Cost-effective and Automated Disaster Recovery as a Service
IA B10

Information Availability

Breakout _original.jpgEnable Global Disaster Recovery with Symantec solutions for Enterprise Linux
IA B11

Information Availability

Breakout _original.jpgHigh Availability and Business Continuity Strategy and Futures
IA B12

Information Availability

Breakout Exadata Exposed: Taking the Hype Out of Engineered Solutions
IA B13

Information Availability

Breakout Keep Your Mission-critical Applications Up and Running 24/7 in Hyper-V Environments
IA B14

Information Availability

Breakout Hot Storage Trends: Maximize Solid State Storage with Symantec
IA B15

Information Availability

Breakout Optimizing data replication using granularity and tiering
IA B16

Information Availability

Breakout Poolside Happy Hour: Meet the Business Continuity and High Availability Experts
IA B17

Information Availability

Breakout Storage Foundation Strategy and Futures
IA B18

Information Availability

Breakout Storage Operations Management and Data Insight Strategy and Futures
IA B19

Information Availability

Breakout _original.jpgThe New Era of Business Continuity
IA B20

Information Availability

Breakout _original.jpgWhy Host-Based SSDs are Critical for SLA in Mission-critical Datacenters
IA B21

Information Availability

Breakout Why Upgrade to Enterprise Vault 10 – an overview of Enterprise Vault's latest releases and feature functionality
IA B22

Information Availability

Breakout Opening the Vault– Enterprise Vault and EV.cloud Roadmap
IA B23

Information Availability

Breakout Ask the Experts – Open Q&A with the Enterprise Vault and EV.cloud Product team
IA B24

Information Availability

Breakout File Governance  - going beyond archiving Email
IA B25

Information Availability

Breakout Cut the clutter – What you have, what you need and what you can safely get rid of
IA B26

Information Availability

Breakout Enterprise Information Archiving in the Cloud: Just the Facts
IA B27

Information Availability

Breakout Exchange Server on Trial for Crimes Against Archiving and eDiscovery
IA B28

Information Availability

Breakout What’s New in NetBackup – The Vision and Roadmap
IA B29

Information Availability

Breakout Best Practices for Backup and Recovery of VMware
IA B30

Information Availability

Breakout NetBackup Accelerator: Warp Speed Ahead
IA B31

Information Availability

Breakout New Adventures in Automated Site Protection and Disaster Recovery
IA B32

Information Availability

Breakout _original.jpgIs Big Data too Big to be Backed Up?
IA B33

Information Availability

Breakout NetBackup Replication Director: The Next Generation of Disk Array Snapshot Management
IA B34

Information Availability

Breakout NetBackup for Oracle: Shaking Hands with the DBA
IA B35

Information Availability

Breakout Protecting the Microsoft Data Center with NetBackup 7.6
IA B36

Information Availability

Breakout Moving Beyond “Dudes With Spreadsheets”:  Monitor and Report on Your NetBackup Environment with OpsCenter
IA B37

Information Availability

Breakout Get Your Head in the Cloud with NetBackup
IA B38

Information Availability

Breakout NetBackup 7.6 for VMware – Taking VMware Data Protection to New Levels
IA B39

Information Availability

Breakout Everything You Need to Know About NetBackup Licensing
IA B40

Information Availability

Breakout NetBackup Customer Panel Spotlight - Real World Advice and Experiences with NetBackup
IA B41

Information Availability

Breakout _original.jpgWhat’s New with NetBackup Appliances
IA B42

Information Availability

Breakout Smiles, Not Pain: Migrating to a New NetBackup Solution
IA B43

Information Availability

Breakout Maximizing Deduplication Performance with NetBackup and NetBackup Appliances
IA B44

Information Availability

Breakout NetBackup Technical Deep Dive
IA B45

Information Availability

Breakout Modernizing Virtual Machine Backup and DR Readiness with Symantec Backup Exec 3600 Appliance
IA B46

Information Availability

Breakout Re-thinking Backup and Archive: Stop the “Noise” and Earn Peace of Mind with Managed Services
IA B47

Information Availability

Breakout NetBackup Performance Tuning: Lessons From the Field
IA B48

Information Availability

Breakout Enterprise Vault Administrator’s Secrets
IA B49

Information Availability

Breakout Take the Power Back: The Future of Backup Exec
IA B50

Information Availability

Breakout TCO of Unified vs. Parallel Backup Solutions for Virtual Environments with Backup Exec
IA B51

Information Availability

Breakout Cloud-Based Disaster Recovery – Be Prepared for Anything with Backup Exec.cloud
IA B52

Information Availability

Breakout _original.jpgLaunching Enterprise Vault 10.0.4 – No Ordinary Maintenance Release
IA B53

Information Availability

Breakout Deep Dive: Storage Foundation Capabilities You Absolutely Need to Know About
IA B55

Information Availability

Breakout A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBackup Appliances & Beyond (Onsite/Offsite)
IA L01

Information Availability

Lab Cluster File System Hands-on Lab
IA L02a

Information Availability

Lab Breaking vMotion myths with Clustering, Application Availability on VMware with Veritas Cluster Server: Part 1
IA L02b

Information Availability

Lab Breaking vMotion myths with Clustering, Application Availability on VMware with Veritas Cluster Server: Part 2
IA L03

Information Availability

Lab Data Insight: Actionable Analytics and Reporting of Data Usage
IA L04a

Information Availability

Lab Dynamic Multi-Pathing for VMware; Improve Storage Path Management: Part 1
IA L04b

Information Availability

Lab Dynamic Multi-Pathing for VMware; Improve Storage Path Management Part 2
IA L05

Information Availability

Lab Maximize Solid State Storage and Performance With Storage Foundation
IA L06

Information Availability

Lab No-fail Failover with Disaster Recovery Advisor
IA L07a

Information Availability

Lab Setup, Configure and Manage Virtual Business Services Across a Multi-Tier Application Deployment with Veritas Cluster Server's: Part One
IA L07b

Information Availability

Lab Setup, Configure and Manage Virtual Business Services Across a Multi-Tier Application Deployment with Veritas Cluster Server part two
IA L08

Information Availability

Lab Veritas Cluster Server 101
IA L09a

Information Availability

Lab Veritas Operations Manager 6.0: Simplify Storage and Availability Management: Part 1
IA L09b

Information Availability

Lab Veritas Operations Manager 6.0: Simplify Storage and Availability Management: Part 2
IA L10

Information Availability

Lab Archiving in a social world – Archiving Social Content with Enterprise Vault
IA L11

Information Availability

Lab Archiving Exchange 2013  - 5 reasons you still need Enterprise Vault for Exchange
IA L12

Information Availability

Lab Archiving Linux and Unix File Systems
IA L13

Information Availability

Lab Taking archived content to the cloud  - Enterprise Vault.cloud 101
IA L14

Information Availability

Lab Hands on with the NetBackup 5230 Appliance
IA L15

Information Availability

Lab NetBackup Replication Director 7.6: A Hands-On Experience
IA L16

Information Availability

Lab Hands on with instant Backup and Recovery Features of NetBackup 7.6 for VMware
IA L17

Information Availability

Lab Auto Image Replication: A Hands-On Experience
IA L18

Information Availability

Lab OpsCenter Basics – Why Aren’t You running It?
IA L19

Information Availability

Lab Configuring Oracle Backups in NetBackup 7.6
IA L20

Information Availability

Lab Analyze This!  Hands on with OpsCenter Analytics
IA L21

Information Availability

Lab Powerful Search and eDiscovert of Enterprise Vault using the Clearwell E-Discovery Platform
IA L22

Information Availability

Lab VMware protection with Backup Exec
IA L23

Information Availability

Lab Critical Application Protection with Backup Exec
IC B01

Information Control

Breakout The Symantec Internet Security Threat Report: Stay Protected Against the Latest Threats
IC B02

Information Control

Breakout Optimize Your Data Loss Prevention Investment for Bottom Line Results
IC B04

Information Control

Breakout _original.jpgIs it Time to Move Your Email Security to the Cloud?
IC B05

Information Control

Breakout Customer Spotlight:  Secure your business from threats and malware with Protection Suite’s Messaging and Web Gateways
IC B06

Information Control

Breakout Analyst and Customer Discussion:  How to Maximize Risk Reduction with Encryption
IC B07

Information Control

Breakout The Cloud Identity Crisis: How Identity and Information Protection will Dictate Future Cloud Success…or Failure
IC B08

Information Control

Breakout Discover the Latest Innovations with Website Security
IC B09

Information Control

Breakout Customer Spotlight: Leveraging Security Intelligence to Create Predictive & Proactive Responses
IC B10

Information Control

Breakout Customer Spotlight: Lessons Learned - Implementing the Phases of the Information Security Model
IC B11

Information Control

Breakout Next Generation Security Management with Symantec Protection Center Mobile
IC B12

Information Control

Breakout Panel Discussion: Automate Compliance for Pain-Free Audits
IC B13

Information Control

Breakout _original.jpgAnalyst Session: Security's Inflection - Our Next 10 Years
IC B14

Information Control

Breakout Customer Spotlight:  Best Practices for Server Protection
IC B15

Information Control

Breakout Customer Spotlight:  User Authentication and Beyond with VIP –Time Warner and Citrix
IC B16

Information Control

Breakout Customer and Analyst Discussion: Best Practices for Managing Vendor Risk
IC B17

Information Control

Breakout Customer Spotlight: 5 Pieces of DLP Advice You Can't Afford to Ignore: Executive Panel on Data Loss Prevention
IC B18

Information Control

Breakout Keeping Trusted Applications Safe on Enterprise Desktop and Mobile with Symantec Code Signing
IC B19

Information Control

Breakout Finding the other 68%:  Creating a Resilient Incident Detection Program
IC B20

Information Control

Breakout _original.jpgThe Future of Cyberdefense - An Information Management Problem
IC B21

Information Control

Breakout BYOR:  Bring Your Own Risk: Protecting PHI Information on Mobile Devices
IC B22

Information Control

Breakout Is the Deck Stacked Against You? Defending a Medical Device Infrastructure against Cyber Threats
IC B23

Information Control

Breakout Trust is not a Control . . . But you still have to have it.  (How I learned to stop worrying and (HI)TRUST Control Compliance Suite)
IC L02

Information Control

Lab Security Analytics: Discover more in your Endpoint Protection Dashboard
IC L03

Information Control

Lab How to Protect your Data Center using Critical System Protection
IC L04

Information Control

Lab How to Protect your vSphere environment with Critical System Protection
IC L05

Information Control

Lab Email Security.cloud - Applying DLP to Email, Securing Office 365 and Google Apps
IC L06

Information Control

Lab Symantec Messaging Gateway (SMG) and Symantec Data Loss Prevention (DLP): control confidential data loss with "single pane of glass"; management
IC L07

Information Control

Lab Data Loss Prevention Configuration and Incident Capture
IC L08

Information Control

Lab Gateway Email Encryption / Data Loss Prevention Integration
IC L09

Information Control

Lab Mobile Email Encryption for iOS
IC L10

Information Control

Lab Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption
IC L11

Information Control

Lab Automated Encryption Using PGP Command Line; Overview & Lab
IC L12

Information Control

Lab Integrating DeepSight with Microsoft DNS to create a DNS Sinkhole
IC L13

Information Control

Lab Integrating DeepSight Intelligence into 3rd Party Solutions
IC L14

Information Control

Lab Symantec Information Security Products working together to protect your environment
IC L15

Information Control

Lab MSS and DS Portal Walkthrough
IC L16

Information Control

Lab Using Managed Security Services Security Analytics for Threat Assessment
IC L17

Information Control

Lab Strategically understanding your IT environment: Install and configure SPC Enterprise to gain visibility into your IT Activities
IC L18

Information Control

Lab Security Management Case Study: Get the most from your security investments with SPC Mobile/Enterprise
IC L19

Information Control

Lab Consolidate Information from Across Your Infrastructure to Create a Custom Report for PCI DSS
IC L20

Information Control

Lab Risk Modeling & Prioritization for More Efficient Data Center Security
IC L21

Information Control

Lab End-to-End Virtual Security
IC L22

Information Control

Lab How to Discover Active Malware on Endpoints You Thought Were Protected
IC L23

Information Control

Lab iPad Authentication with Symantec MPKI and Active Sync Connections
IL B01 Breakout Scale-out Global Deduplication Up to 900TB/hr
IL B02   Breakout Cyber Incident Response – A Discussion of Lessons Learned
IL B03   Breakout _original.jpgMobile Healthcare Security - Risks and Solutions
IL B04   Breakout _original.jpgBackup as a Service – Is it right for your enterprise?
IL B05   Breakout _original.jpgReshaping Data Protection: Eliminating boundaries to address data explosion challenges with Fujitsu ETERNUS CS HE and Symantec NetBackup
IL B06   Breakout _original.jpgNew Directions for Security Services and the Software Defined Data Center
IL B07   Breakout Symantec  IT’s Real-World Experience with a VMware Software-Defined Data Center
IL B08   Breakout _original.jpgOptimize Your Enterprise:  Discover Intel® Technologies powering Symantec™ Solutions across Ultrabooks™, tablets, storage and appliances
IL B09   Breakout Fighting APT's Through Server Security and Increased Security Tool Visibility
IL B10   Breakout Accenture and Symantec: Using Orchestrated Security Intelligence to protect your critical information and enable business value
IL B11   Breakout Industry Leadership Case study – NetAPP
IL B12   Breakout _original.jpgAvoiding DLP Pitfalls - A Discussion of Lessons Learned
IL B13   Breakout _original.jpgAdding strong authentication to your website in less than 60 minutes using Symantec Validation and ID Protection Service (VIP) and Intel Identity Protection Technology (IPT)
IL B15   Breakout Fujitsu SAP HANA: Success Factors for a First Class SAP HANA Implementation
IL B16   Breakout _original.jpgCompliance for the Software-Defined Data Center
IL B17   Breakout A Holistic Approach to Data Protection
IL B18   Breakout Applications & Data Security (Current Challenges & Leading Practices from HP & SYMC)
IL B19   Breakout Fujitsu Secure Global Cloud: How to establish a secure agile IT
IL B20   Breakout Enriching CCS with RedSeal's Network Security Architecture Analytics
IL B21   Breakout Leveraging legacy architectures in modern cloud deployments
IL B22   Breakout Seeing through the clouds: The challenges and opportunities of cloud-based data protection
UP B01

User Protection

Breakout Custom Inventory & Reporting
UP B02

User Protection

Breakout _original.jpgAsset Management Suite - Technology Overview and Roadmap
UP B03

User Protection

Breakout Don't eXPire: Simplify Your Windows Migration
UP B04

User Protection

Breakout _original.jpgHow to Implement Scoped Security Roles in Time for Deployment
UP B05

User Protection

Breakout Customer Case Studies: Advanced Server Management
UP B06

User Protection

Breakout Customer Case Study: How to Set-up and Configure Symantec Workspace Streaming
UP B07

User Protection

Breakout _original.jpgIT Management Suite Design, Tuning & Optimization – Do It Right The First Time
UP B08

User Protection

Breakout Your New Best Friends: PowerShell and the ASDK
UP B10

User Protection

Breakout Customer Roundtable: Workflow
UP B11

User Protection

Breakout _original.jpgGetting the Most Out of Software Management
UP B12

User Protection

Breakout Improving the Administrative Experience with Console Enhancements
UP B13

User Protection

Breakout IT Analytics in Action - Use Cases From the Front Lines
UP B14

User Protection

Breakout Make Your Life Easier With Self-Service Solutions
UP B15

User Protection

Breakout Managing in a Cloud Enabled World
UP B16

User Protection

Breakout _original.jpgManaging MACs Through the Eyes of a Windows Admin
UP B18

User Protection

Breakout ServiceDesk Technology Overview and Roadmap
UP B19

User Protection

Breakout What’s New in Endpoint Management
UP B20

User Protection

Breakout Things You Would Love to Know About Altiris 7.1
UP B21

User Protection

Breakout _original.jpgUpgrading from Altiris 6.x to 7.x
UP B22

User Protection

Breakout What Differentiates Symantec from the Management Pack
UP B23

User Protection

Breakout _original.jpgWhat's New in Deployment & Imaging
UP B24

User Protection

Breakout _original.jpgWorkspace Virtualization & Streaming Overview
UP B25

User Protection

Breakout Roadmap:  Symantec Endpoint Protection
UP B26

User Protection

Breakout Real world mobile use cases from Quest Diagnostics,  Skywest, Indian River School District, others
UP B27

User Protection

Breakout Symantec's Mobility Strategy and Roadmap
UP B28

User Protection

Breakout Making BYOD a Reality While Maintaining Control of Data
UP B29

User Protection

Breakout Get Your Business Critical Apps Protected Simply and Quickly with the Symantec Sealed Program
UP B30

User Protection

Breakout Help!  I Think I've Been Hit with Malware: Best Practices on what to do next.
UP B32

User Protection

Breakout Beyond Antivirus: Network Threat Protection, Insight and SONAR
UP L01

User Protection

Lab Expanding the Service Catalog With Custom Workflow Requests
UP L02

User Protection

Lab Implementing Cloud Enabled Management
UP L03

User Protection

Lab Implementing the Zero Day Patch Template
UP L04

User Protection

Lab Introduction to 3rd Party Patching Using the 4A Model
UP L05

User Protection

Lab Introduction to Deployment Solution 7.5
UP L06

User Protection

Lab Introduction to Workspace Virtualization & Streaming
UP L07

User Protection

Lab Maintaining Application Customizations as Part of Patch Process
UP L08

User Protection

Lab Symantec Management Platform Troubleshooting
UP L09

User Protection

Lab Reporting on Software License Compliance
UP L10

User Protection

Lab How to Configure ServiceDesk 7.5
UP L11

User Protection

Lab Using IT Analytics as an Alternative Reporting Platform
UP L12

User Protection

Lab Still on SEP 11? Let us show you how to simplify migration to SEP 12
UP L13

User Protection

Lab Leverage the Full Protection of Symantec Endpoint Protection 12
UP L16

User Protection

Lab Personal and Business Coexistence on Mobile Devices
UP L17a

User Protection

Lab Virtualization: Security Without Sacrificing Performance: Part 1
UP L17b

User Protection

Lab Virtualization: Security Without Sacrificing Performance: Part 2
UP L18

User Protection

Lab Mobile Device Management update for 4.1 + Email