Video Screencast Help

Symantec Vision

Results for Symantec Vision

The Symantec Technology and Response (STAR) experts will provide a detailed, data-driven threat telemetry analysis into undetected targeted attacks that have hit enterprises over the past months, revealing the methods these attackers used to target their ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Out-of-control unstructured data growth creates all kinds of storage management, information security and compliance problems. Learn how you can design a successful data governance strategy thanks to Information Fabric. You'll also discover how ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Business continuity is a broad and challenging topic. It starts with the ability to protect sprawling data, meet basic service level agreements and stop security threats. But you also have to maintain that continuity as you embrace virtualization, cloud ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Organizations face many new security challenges as their data centers become highly virtualized and increasingly software-defined. An in-depth explanation of how Symantec Data Center Security solutions can meet the security and compliance needs in your ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
As the security threat landscape continues to evolve and increase in sophistication, unknown and zero-day malware poses serious risks to all kinds of organizations. In that world, you need to continuously enhance the level of protection that you offer ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Are you moving quickly toward a highly virtualized, software-defined data center model? A crash course on what you need to know as a NetBackup Administrator. In one quick hour, you'll get a rapid-fire rundown of the important topics and ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
The new Backup Exec 2014 offers a host of important new data protection options nad capabilities for your virtual environments. An overview of these new capabilities and what they mean for your organization. You'll also receive a sneak peek into how ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
For the last 20 years, security experts have exposed passwords as the Achilles heel of the Internet. Enterprises have struggled with the increased security risk, inhibited productivity and added costs of password management. Discover the new VIP Login, ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
As threats to your data continue to evolve, Symantec answers with innovative technology to keep your organization safe. The inside track on the next generation of data loss prevention technologies being developed by Symantec Research and Development. ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments
Your range of secondary storage choices has grown far beyond classic tape backup to include tape, disk, snapshots, cloud and dedupe appliances. Explore the pros and cons of these various choices, the predominant architectures in use today (such as ...
Article by LeslieMiller | 10 Oct 2014 | 0 comments