Video Screencast Help

Vision 2014 Las Vegas Session Directory

Created: 01 May 2014 • Updated: 02 Jul 2014
Language Translations
Swathi Turlapaty's picture
+3 3 Votes
Login to vote

* Breakout Session titles will be linked to the presentations/ videos as they become available. Not all breakout sessions will be available.
**Hands-on Labs are currently not available for download.

 

Session ID

Type

Title

Tracks

1249

Breakout Session

Symantec Endpoint Encryption: Deployment Best Practices and Roadmap

Supporting the Evolving Endpoint

1260

Breakout Session

Accelerate BYOD Adoption by Protecting Privacy

Supporting the Evolving Endpoint

1280

Breakout Session

OpenStack and Storage Foundation Evolution

Enabling the Agile Data Center

1282

Hands On Lab

Deploy next generation one-touch strong authentication using Symantec VIP

Embracing Proactive Cyber Security

1283

Hands On Lab

How to Use CCS to Proatively Manage Risk

Embracing Proactive Cyber Security

1308

Breakout Session

Preview of the New Symantec Access Management Platform

Embracing Proactive Cyber Security

1312

Breakout Session

I Can (and Will) Take over Your Business in Ten Steps

Embracing Proactive Cyber Security

1314

Hands On Lab

Symantec Certificate Intelligence Centre

Embracing Proactive Cyber Security

1318

Breakout Session

Cyber Security Reimagined for Today's Digital World

Turning Complex Trends into Competitive Advantage

1320

Breakout Session

Cloud Security: How I Sleep at Night

Embracing Proactive Cyber Security

1323

Hands On Lab

Protecting VMware Environments with Backup Exec 2014

Enabling the Agile Data Center

1325

Hands On Lab

Configuring the Backup Exec 3620 Appliance

Enabling the Agile Data Center

1326

Hands On Lab

Optimizing Backup Exec 2014 Performance

Enabling the Agile Data Center

1336

Breakout Session

Fencing the Cloud

Supporting the Evolving Endpoint

1352

Breakout Session

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Supporting the Evolving Endpoint

1365

Breakout Session

Demystifying the NIST Cybersecurity Framework:  What It Means for You

Turning Complex Trends into Competitive Advantage

1366

Hands On Lab

Optimize Security and Compliance Assessments with CCS

Enabling the Agile Data Center

1380

Hands On Lab

Applying Data Center Security with VMware NSX

Enabling the Agile Data Center

1381

Hands On Lab

Enhance Asset Discovery and SCAP 1.2 Compliance for Continuous Monitoring with CCS Standards Manager

Enabling the Agile Data Center

1394

Hands On Lab

Zero to Install in 30 Minutes or Less with NetBackup Appliances

Enabling the Agile Data Center

1396

Hands On Lab

Implementing Data Center Security: Server and Server Advanced

Enabling the Agile Data Center

1403

Breakout Session

Case Studies: Safeguarding Critical Business Data and Maintaining Compliance in the Modern Data Center

Enabling the Agile Data Center

1404

Hands On Lab

Mobile Data Exposed: Hacking Unencrypted Apps

Supporting the Evolving Endpoint

1406

Breakout Session

Gartner Briefing: 2014 Job Description for IT: Modernization and Agility in the Information Age

Turning Complex Trends into Competitive Advantage

1410

Breakout Session

Trust as a Competitive Advantage in a World of Growing Digital Threats

Embracing Proactive Cyber Security

1412

Hands On Lab

Integrating with a Service Desk using Symantec MSS Secure Web Services APIs

Embracing Proactive Cyber Security

1419

Hands On Lab

Remediating Advanced Persistent Threats with MSS and DeepSight

Embracing Proactive Cyber Security

1423

Hands On Lab

Insights from a Symantec SOC Analyst: A Review of Security Incident Analysis

Embracing Proactive Cyber Security

1424

Hands On Lab

The Practical Value of NetBackup OST integration with Primary Storage

Enabling the Agile Data Center

1428

Hands On Lab

Integrating DeepSight URL, IP Datafeeds and Portal Access into Splunk

Embracing Proactive Cyber Security

1435

Breakout Session

_original.jpgAnatomy of a Targeted Attack

Supporting the Evolving Endpoint

1438

Hands On Lab

Best Practices For Migrating From SEP 11 to SEP 12

Supporting the Evolving Endpoint

1440

Hands On Lab

Are You Harnessing the Full Protection Power of SEP 12?

Supporting the Evolving Endpoint

1443

Breakout Session

_original.jpgSymantec's Secret Sauce for Mobile Threat Protection

Supporting the Evolving Endpoint

1445

Breakout Session

Backup Exec 2014 Data Protection for Virtual Environments and Roadmap

Enabling the Agile Data Center

1452

Hands On Lab

Get Familiar with OpsCenter and OpsCenter Analytics 7.6

Enabling the Agile Data Center

1454

Hands On Lab

Explore the new NetBackup 7.6 Features for VMware

Enabling the Agile Data Center

1455

Breakout Session

_original.jpgIdentity and Authentication for the Mobile Enterprise

Supporting the Evolving Endpoint

1456

Hands On Lab

NetBackup Intelligent Policy for Oracle

Enabling the Agile Data Center

1459

Breakout Session

How Integration between MSS, SEP, and Next-generation Firewalls Catch Targeted and Advanced Persistent Threats

Embracing Proactive Cyber Security

1460

Hands On Lab

Hands-On Tour of Data Loss Prevention

Embracing Proactive Cyber Security

1461

Hands On Lab

Solving the Mystery of Data Ownership: Remediate Incidents with Data Insight and Data Loss Prevention

Embracing Proactive Cyber Security

1465

Breakout Session

The Future of Data Loss Prevention: 5 Trends Shaping Symantec's Vision and Roadmap

Embracing Proactive Cyber Security

1466

Breakout Session

To Catch a Thief: Preventing the Next Fortune 500 Data Breach

Embracing Proactive Cyber Security

1468

Breakout Session

Targeted Attacks: Three Real-world Cases that Impacted Organizations around the Globe

Embracing Proactive Cyber Security

1480

Breakout Session

Big Data in Action: Behind the Scenes at Symantec with the World’s Largest Threat Intelligence Data

Embracing Proactive Cyber Security

1481

Breakout Session

Behind the Yellow Curtain: Discover Symantec's Proactive Protection Technology

Embracing Proactive Cyber Security

1483

Breakout Session

Gateway, Cloud and Targeted Attacks: Symantec's Vision, Strategy and Roadmap

Embracing Proactive Cyber Security

1484

Breakout Session

_original.jpgThe Evolving Threat Landscape 2014: Postmortem and Lessons Learned from Simple and Advanced Threats Discovered in 2013

Embracing Proactive Cyber Security

1485

Breakout Session

Microsoft Office 365: Uncertainty Matters

Embracing Proactive Cyber Security

1486

Breakout Session

Secure Your Email with Encryption As a Service

Embracing Proactive Cyber Security

1487

Breakout Session

Proactively Discovering Malicious Activity on Your Network

Embracing Proactive Cyber Security

1504

Breakout Session

_original.jpgWhat's Next for Endpoint Management?

Supporting the Evolving Endpoint

1505

Breakout Session

Managing Remote and Mobile Workers

Supporting the Evolving Endpoint

1507

Breakout Session

Upgrade to IT Management Suite 7.5

Supporting the Evolving Endpoint

1508

Breakout Session

Customer Case Study - How We Manage Macs

Supporting the Evolving Endpoint

1509

Breakout Session

Customer Case Study - Patch, Monitor, and Manage Servers

Supporting the Evolving Endpoint

1510

Breakout Session

_original.jpgBuilding Efficiency in Endpoint Security and Management

Supporting the Evolving Endpoint

1511

Breakout Session

Reduce Administrator Workload with Effective Use of Targets, Filters, and Groups in ITMS

Supporting the Evolving Endpoint

1512

Breakout Session

Reducing Software License Costs

Supporting the Evolving Endpoint

1513

Breakout Session

Simplify and Enable BYOD and VDI

Supporting the Evolving Endpoint

1514

Breakout Session

Simplifying Windows Migrations

Supporting the Evolving Endpoint

1516

Breakout Session

_original.jpgYou've Been Breached!  Now What?  How to Respond and Remediate Faster

Embracing Proactive Cyber Security

1517

Breakout Session

Getting to a World without Passwords

Embracing Proactive Cyber Security

1518

Breakout Session

_original.jpgBest Practices in Virtualization & Cloud Security with Symantec

Embracing Proactive Cyber Security

1521

Breakout Session

The Integration Point for Cyber Security

Embracing Proactive Cyber Security

1523

Hands On Lab

Protecting Email with DLP and Encryption

Embracing Proactive Cyber Security

1524

Hands On Lab

Preventing Malicious Activity with Symantec Web Gateway

Embracing Proactive Cyber Security

1525

Hands On Lab

Strong Email Security with Symantec Messaging Gateway

Embracing Proactive Cyber Security

1527

Breakout Session

BYOD: No Longer "If" but "How"

Supporting the Evolving Endpoint

1528

Breakout Session

_original.jpgMaking Android Enterprise Ready

Supporting the Evolving Endpoint

1531

Breakout Session

Hitchikers' Guide to Building an Effective Mobile Strategy

Supporting the Evolving Endpoint

1532

Breakout Session

_original.jpgThe New Mobile User

Supporting the Evolving Endpoint

1533

Breakout Session

Enterprise Mobility Roadmap

Supporting the Evolving Endpoint

1540

Breakout Session

Gartner Briefing: Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Turning Complex Trends into Competitive Advantage

1541

Breakout Session

What's New in Endpoint Protection: Symantec Vision and Roadmap

Supporting the Evolving Endpoint

1542

Breakout Session

_original.jpgCaught in the Crosshairs of Evolving Endpoints and Malware Sophistication: Real-World Customer Experiences

Embracing Proactive Cyber Security

1543

Breakout Session

_original.jpgHow do Hackers Breach ATMs and Cash Registers? See a LIVE Demo and Get the Latest Research From Our Security Experts

Embracing Proactive Cyber Security

1544

Hands On Lab

Best Practices for Deploying SEP 12 on Embedded Devices

Supporting the Evolving Endpoint

1545

Hands On Lab

Encryption and DLP: The Power of Integration

Supporting the Evolving Endpoint

1546

Breakout Session

A Behind the Scenes Look at Cybercriminals: Their Methods and How to Stay Ahead of Them

Embracing Proactive Cyber Security

1547

Breakout Session

Has the NSA Cracked Encryption?

Supporting the Evolving Endpoint

1560

Breakout Session

Storage Management and Business Continuity Strategy and Futures

Enabling the Agile Data Center

1580

Breakout Session

Secure File Sharing Using Norton Zone powered by Symantec

Supporting the Evolving Endpoint

1581

Breakout Session

Information Governance Strategies to Reduce Costs and Risks

Enabling the Agile Data Center

1582

Breakout Session

The New Era of Business Continuity

Enabling the Agile Data Center

1620

Hands On Lab

Cloud-enabled Management

Supporting the Evolving Endpoint

1621

Hands On Lab

How to Upgrade to IT Management Suite 7.5

Supporting the Evolving Endpoint

1622

Hands On Lab

Efficient Mac Management with IT Management Suite 7.5

Supporting the Evolving Endpoint

1623

Hands On Lab

Achieving Software License Compliance

Supporting the Evolving Endpoint

1624

Hands On Lab

Reduce Administrator Workload with Effective Use of Targets, Filters, and Groups in ITMS-Lab

Supporting the Evolving Endpoint

1625

Hands On Lab

Deployment Solution 7.5

Supporting the Evolving Endpoint

1626

Hands On Lab

Introduction to Workspace Virtualization and Streaming

Supporting the Evolving Endpoint

1640

Breakout Session

Roadmap: The Evolution of Data Center Security, Risk and Compliance

Enabling the Agile Data Center

1641

Breakout Session

Customer Deep Dive: Securing the Modern Data Center

Enabling the Agile Data Center

1642

Breakout Session

NetBackup: Future Directions

Enabling the Agile Data Center

1643

Breakout Session

NetBackup Appliance: What's New and Future Directions

Enabling the Agile Data Center

1661

Hands On Lab

Maximizing Solid State Storage and Performance with Storage Foundation

Enabling the Agile Data Center

1680

Breakout Session

_original.jpgOptimizing eDiscovery and Information Governance

Enabling the Agile Data Center

1701

Breakout Session

Symantec Archiving Roadmap

Enabling the Agile Data Center

1702

Hands On Lab

Manage your Mobile Applications using Symantec App Center and the Sealed Program

Supporting the Evolving Endpoint

1703

Hands On Lab

Securing Mobile Device Access with App Center MDM and Managed PKI

Supporting the Evolving Endpoint

1704

Breakout Session

_original.jpgLong Live DAS! Symantec and Intel Brings You Back to the Future with Direct Attached Storage

Enabling the Agile Data Center

1705

Breakout Session

Key Considerations for Enterprise File Sharing

Supporting the Evolving Endpoint

1707

Breakout Session

Using Norton Zone in a Business Environment

Supporting the Evolving Endpoint

1708

Breakout Session

Business Critical Virtualization for VMware

Enabling the Agile Data Center

1709

Breakout Session

Building Enterprise Class Hyper-V Solutions with Symantec and Microsoft

Enabling the Agile Data Center

1710

Breakout Session

_original.jpgSymantec and Microsoft: Delivering Disaster Recovery to the Cloud

Enabling the Agile Data Center

1711

Hands On Lab

Breaking vMotion Myths with Clustering, Application Availability on VMware with Symantec Cluster Server

Enabling the Agile Data Center

1720

Breakout Session

_original.jpgForward Secrecy: How to Secure SSL from Attacks by Government Agencies

Embracing Proactive Cyber Security

1721

Hands On Lab

Email Security.cloud -- Data Protection and Stronger Security for Email and Microsoft Office 365

Embracing Proactive Cyber Security

1722

Hands On Lab

Data Insight: Actionable Intelligence for your Unstructured Data

Enabling the Agile Data Center

1723

Hands On Lab

Automated Business Continuity Risk Monitoring with Disaster Recovery Advisor

Enabling the Agile Data Center

1724

Hands On Lab

Best Practices for Deploying SEP 12 for VDI

Supporting the Evolving Endpoint

1725

Breakout Session

_original.jpgNetBackup 7.6 Best Practices: Optimizing Performance

Enabling the Agile Data Center

1726

Breakout Session

_original.jpgNetBackup 7.6 Best Practices: Improving Recovery Times

Enabling the Agile Data Center

1727

Breakout Session

_original.jpgNetBackup 7.6 Best Practices: Protecting Databases and Applications

Enabling the Agile Data Center

1728

Breakout Session

Architecting the Right Storage Strategy with NetBackup 7.6

Enabling the Agile Data Center

1729

Breakout Session

Planning and Executing your Upgrade to NetBackup 7.6

Enabling the Agile Data Center

1730

Breakout Session

NetBackup 7.6 Performance Benchmark within a Large Scale VMware Environment

Enabling the Agile Data Center

1731

Breakout Session

Top Things a NetBackup Administrator Should Know About Virtualization, SDDC, Cloud, and the Modern Data Center

Enabling the Agile Data Center

1733

Breakout Session

Keep It Secret, Keep It Safe: Data Loss Prevention at Your Gateway

Embracing Proactive Cyber Security

1734

Breakout Session

Truth, Lies and Information Management

Enabling the Agile Data Center

1735

Breakout Session

Two-Factor Authentication in Today’s Global Enterprise: The Accenture Story

Embracing Proactive Cyber Security

1736

Hands On Lab

Introduction to DeepSight Early Warning Services Portal

Embracing Proactive Cyber Security

1737

Hands On Lab

NBU for Hyper-V Basics

Enabling the Agile Data Center

1738

Hands On Lab

Setup, Configure and Manage Virtual Business Services Across a Multi-Tier Application Deployment with Symantec Cluster Server

Enabling the Agile Data Center

1739

Hands On Lab

Veritas Operations Manager 6.0: Simplify Storage and Availability Management

Enabling the Agile Data Center

1740

Hands On Lab

Unleash the Power of DAS with Symantec Cluster File System and Flexible Storage Sharing

Enabling the Agile Data Center

1741

Hands On Lab

ApplicationHA for Hyper-V Environments

Enabling the Agile Data Center

1742

Hands On Lab

Enterprise Vault 11 Lab1:  Search and PST Migration Enhancements

Enabling the Agile Data Center

1743

Hands On Lab

Enterprise Vault 11 Lab 2: IMAP Integration

Enabling the Agile Data Center

1745

Hands On Lab

Dynamic Multi-Pathing for VMware: Improve Storage Path Management

Enabling the Agile Data Center

1760

Hands On Lab

Protecting Solusell: An Interactive Case Study in Policy-based Endpoint Protection

Supporting the Evolving Endpoint

1761

Hands On Lab

Endpoint Protection Break/Fix Lab

Supporting the Evolving Endpoint

1762

Breakout Session

Technology Innovation at Symantec:  A Discussion with the Symantec Fellows

Turning Complex Trends into Competitive Advantage

1763

Breakout Session

Customer Leadership Panel: The Balancing Act Between Security and the Business

Turning Complex Trends into Competitive Advantage

1784

Hands On Lab

Backup Exec 2014: Best practices for a Successful Migration

Enabling the Agile Data Center

1785

Hands On Lab

Establishing a Highly Available Enterprise Vault Infrastructure in just a Few Simple Clicks

Enabling the Agile Data Center

1800

Hands On Lab

Dissecting a Cyber Attack Using a Simulation

Embracing Proactive Cyber Security

1801

Breakout Session

NetBackup 7.6 Best Practices: Protecting Virtual Environments

Enabling the Agile Data Center

1802

Breakout Session

NetBackup as a Service

Enabling the Agile Data Center

1820

Hands On Lab

Application and Data Recovery with Symantec Disaster Recovery Orchestrator and Microsoft Windows Azure

Enabling the Agile Data Center

1940

Hands On Lab

Expanding your Workflow or ServiceDesk  Service Catalog with a Custom Workflow Request

Supporting the Evolving Endpoint

1960

Hands On Lab

Symantec Secure App Service: How I Stop My Company from Spreading Malware

Embracing Proactive Cyber Security

2040

Breakout Session

_original.jpgSecurity Implications of Software Defined Networks (SDNs) and Network Function Virtualization (NFV)

 

2041

Breakout Session

_original.jpgExploring Emerging Security Ramifications in M2M Networks

 

2042

Breakout Session

_original.jpgEnhancing Your Disaster-Recovery-as-a-Service Offering

 

2043

Breakout Session

Mobile Dashboard

 

 

You can access Vision 2013 sessions here.