Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

Trends in Trust on the internet of Things We are all happy with how technology is making our lives easier and fulfilling. Most of the internet population is however not aware that the moment you turn on a device connected to internet or ...
Article by dion_alken | 22 Apr 2015 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how NetBackup ...
Article by GFK | 22 Jan 2015 | 0 comments
Red Hat and Symantec together offer enterprise IT organizations a highly available and highly scalable virtualization infrastructure for traditional and cloud-enabled applications. Red Hat Enterprise Virtualization provides an enterprise-ready ...
Article by Patric Uebele | 11 Dec 2014 | 0 comments
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). You are now able to configure these exclusions from the SEP Manager, via an Exceptions policy. However if you still need to use ...
Article by DSOLO | 04 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 07 Nov 2014 | 0 comments
Data Center Architecture In data centers like Cisco's UCS (Unified Computing System), every server be it blade or rack-mount, is provisioned through a Service Profile. Just the way a SIM card holds an identity of a mobile phone, the ...
Article by Kshitij_Korde | 31 Oct 2014 | 1 comment
A Full Unix/Linux client recovery from a backup image requires setting up a recovery environment on the target client hardware specifically for the activity. Overwriting system files on a running system will cause it to crash and leave it in a non-boot ...
Article by Jaime_Vazquez | 15 Jul 2014 | 0 comments
Let me start off by saying, this was done to reduce the need for loading network drivers on the WinPE discs and so far has worked for most systems without issue, with that being said, we have had a few machines that have displayed issues with the GPT ...
Article by bl_fowler | 18 Mar 2014 | 0 comments
Cena comum no departamento de TI de praticamente qualquer empresa: Precisamos comprar um novo Storage! Seja porque o Storage atual está próximo a ficar sem garantia, ou não suporta mais a performance dos ambientes a que serve, ou mesmo a necessidade ...
Article by RAPHAEL F CARVALHO | 06 Mar 2014 | 0 comments
This deployment guide explains how to install and configure Symantec Storage Foundation and High Availability products on Red Hat Enterprise Linux (RHEL) systems using the Yum package manager. Special focus is on the RHEL 6.4/6.5 version, as ...
Article by Patric Uebele | 27 Feb 2014 | 5 comments