Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Symantec Tech Exchange Events

Public Group | Founded: 22 Aug 2012 | Serving 56 members

A forum for attendees of the Symantec Tech Exchange, and others who want a deeper knowledge of Symantec solutions for Virtualization, Security, Cloud Computing and Mobility.

SAMPLE AGENDA

8:30 - 9:00am

Registration and Breakfast

9:00 - 9:45am

Welcome Keynote

9:45 - 10:45am

Breakout Sessions (select one)

Track 1: Protecting Virtual Environments Efficiently and Effectively

Track 2: How to Achieve Database Availability and Data Center Agility

Track 3: Mobile App Management

10:45 -11:15am

Break and Birds of a Feather Discussion Tables

11:15 -12:15pm

Breakout Sessions (select one)

Track 1: Modern Approaches to the Backup and Recovery of Virtual Machines

Track 2: Providing High Availability and Disaster Recovery for Complex Applications

Track 3: Mobile Protection

12:15 -12:30pm

Wrap Up & Drawing of Completed Feedback Forms

12:30 – 1:00pm

Optional Lunch for Afternoon Attendees

1:00 – 2:00pm

Tap Into The Best Of NetBackup & Appliances

KEYNOTE ADDRESS
Download Presentation PDF

BREAKOUT SESSION ABSTRACTS:

Track 1:  Protecting Virtual Environments Efficiently and Effectively
Securing a virtual environment has traditionally come at the cost of performance or virtualization density.  Symantec and VMware have built integrations across Symantec Endpoint Protection and Symantec Critical System Protection to optimally secure virtual desktops and servers. Come to this session to learn how Symantec uses vShield endpoint to secure VDI and can protect the entire vSphere environment, including ESXi guests, ESXi hypervisors and vCenter – all allowing for maximum performance without sacrificing security.
Download Presentation PDF

Track 1: Modern Approaches to the Backup and Recovery of Virtual Machines
Attend this session to understand why virtual-only backup tools only give you half the picture and why a backup client in a VM is not optimized for business-critical applications. See why Symantec Backup Exec and NetBackup backup more VMs than anyone in the market by providing deep integration with both VMware and Hyper-V. Topics will include how to optimize backup performance, meet aggressive recovery SLAs, and streamline disaster recovery.
Download Presentation PDF

Track 2: How to Achieve Database Availability and Data Center Agility
In today’s increasingly complex datacenter environment, providing automated high availability and disaster recovery is a major challenge. If you have a manual recovery plan, your company's operations are in your hands when a outages occur. Can you afford prolonged, unplanned downtime while you figure out what went wrong and how to fix it?  Using highly automated procedures for disaster recovery operations eliminates this risk.  In this session you will learn about availability and DR best practices and how Symantec solutions help you achieve them. We’ll showcase the demo: High Availability: Managing Complex Applications as a Virtual Business Service”.
Download Presentation PDF

Track 2: Providing High Availability and Disaster Recovery for Complex Applications
In today’s increasingly complex datacenter environment, providing automated high availability and disaster recovery is a major challenge. If you have a manual recovery plan, your company's operations are in your hands when a outages occur. Can you afford prolonged, unplanned downtime while you figure out what went wrong and how to fix it?  Using highly automated procedures for disaster recovery operations eliminates this risk.  In this session you will learn about availability and DR best practices and how Symantec solutions help you achieve them. We’ll showcase the demo: High Availability: Managing Complex Applications as a Virtual Business Service.
Download Presentation PDF
 

Track 3: Mobile App Management
Mobile Device Management (MDM) is the first thing many companies think about when attempting to address mobility in the enterprise.  However, with the increasing popularity of BYOD, the restrictions of regulated industries, and other challenging mobility use cases, businesses are realizing that the default MDM-centric approach is often insufficient to protect essential business data, or simply impractical to implement on personally owned devices. Mobile Application Management allows the application of specific controls to only the apps and documents that the company has liability for, providing a greater degree of protection and control where it is needed, without having to apply policies to the device as a whole. This new technology is the powerful next wave in mobile management that everyone is talking about.  Attend this session to learn more about Symantec’s unique offering and how it ties into a comprehensive solution to address the broadest range of use cases.
Download Presentation PDF

Track 3: Mobile Protection
Managing mobile devices is all about protecting mobile data in all of the various places it is transmitted, stored and viewed. Unlike traditional PCs, mobile devices naturally communicate over channels that companies have no control over, and several additional operating systems have been introduced in the last few years. This complexity requires a fresh view and new technology to ensure that you have sufficient visibility and control over your precious data. MDM products only go so far toward that end. But Symantec offers the most comprehensive suite of mobile technologies to provide you with true protection, over your data, your apps, and your devices. Attend this session to learn about Symantec’s complete suite of products and how they work together to apply to your various needs, including Mobile Security, Mobile Management, Data Loss Prevention, Managed PKI Service, Two-factor Authentication, Encryption, and others.
Download Presentation PDF

SPECIAL LUNCHEON SESSION:

Tap Into The Best Of NetBackup & Appliances

This session will focus on three use cases that can improve backup performance, daily operations, and disaster recovery. 

  • How to break the backup window, throw out your VTL, and protect remote offices using NetBackup deduplication and accelerator
  • How and why refresh your media servers with NetBackup appliances
  • What steps can you take to improve DR and testing with NetBackup Auto-Image Replication and appliances?

Download Presentation PDF

Follow our product teams on Twitter:

@backupexec @netbackup
@symEndpointDocs @sym_endpoint
@SymantecStorage @SymantecEMM

Group Activity

Show:
New event 28 Aug 2012
LEARN Innovations in cloud computing, virtualization and mobility are rapidly changing the IT landscape. Successfully implemented these trends offer opportunities for strategic business advantages, but can also pose potential threats and risks for an ...
New event 28 Aug 2012
LEARN Innovations in cloud computing, virtualization and mobility are rapidly changing the IT landscape. Successfully implemented these trends offer opportunities for strategic business advantages, but can also pose potential threats and risks for an ...
New event 28 Aug 2012
LEARN Innovations in cloud computing, virtualization and mobility are rapidly changing the IT landscape. Successfully implemented these trends offer opportunities for strategic business advantages, but can also pose potential threats and risks for an ...
New event 28 Aug 2012
LEARN Innovations in cloud computing, virtualization and mobility are rapidly changing the IT landscape. Successfully implemented these trends offer opportunities for strategic business advantages, but can also pose potential threats and risks for an ...
New event 28 Aug 2012
LEARN Innovations in cloud computing, virtualization and mobility are rapidly changing the IT landscape. Successfully implemented these trends offer opportunities for strategic business advantages, but can also pose potential threats and risks for an ...
New event 28 Aug 2012
LEARN Innovations in cloud computing, virtualization and mobility are rapidly changing the IT landscape. Successfully implemented these trends offer opportunities for strategic business advantages, but can also pose potential threats and risks for an ...