Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

I do not need a solution (just sharing information) Are you ready for the upcoming SEP 11 EOSL with up-to-date software?  Are you aware of, and using, the full protection stack in SEP ...
Forum Discussion by Swathi Turlapaty | 11 Sep 2014 | 5 comments
I need a solution When starting new threads in here, please make sure to address necessary information like the Operating systems and NetBackup version numbers. I certainly ...
Forum Discussion by Swathi Turlapaty | 25 Feb 2010 | 16 comments
Introduction With ever growing volumes of data in typical organizations and increasing scrutiny around management and retention of that data, companies are beginning to seek more cost-effective ways to scale their storage environments. In  ...
Article by Swathi Turlapaty | 04 Jan 2010 | 0 comments
Introduction This paper describes Veritas NetBackup Bare Metal Restore (BMR), an option to NetBackup 6.0 that eliminates the need for disparate bare metal recovery methodologies and greatly improves the speed and simplicity of system recovery by ...
Article by Swathi Turlapaty | 04 Jan 2010 | 1 comment
Introduction The Snapshot function of a Network Appliance storage system provides a fast and completely stable point-in-time copy of files, directory hierarchies, and LUNs. Snapshot copies give administrators near instantaneous access to previous ...
Article by Swathi Turlapaty | 04 Jan 2010 | 0 comments
Introduction Solving today’s enterprise data management challenges The explosion of data and increasing pressure on IT to provide dependable recovery of files and email on enterprise networks requires an effective data management strategy ...
Article by Swathi Turlapaty | 04 Jan 2010 | 0 comments
Abstract Veritas NetBackup™ 6.5 introduces two new features, Data Classifications and Storage Lifecycle Policies, that are intended to simplify the way in which backed-up data is organized. This paper looks at how these features relate to recovery ...
Article by Swathi Turlapaty | 04 Jan 2010 | 0 comments
EXECUTIVE SUMMARY Influenced by factors such as disaster recovery, regulatory compliance, legal pressures, and IT risk management, many IT organizations need to enhance their current data protection to improve recovery and reliability and meet ...
Article by Swathi Turlapaty | 04 Jan 2010 | 0 comments
Executive Summary Data Protection Challenges for Desktops & Laptops When it comes to protecting data on desktops and laptops, today’s IT administrators are faced with a daunting challenge. An increasing amount of important corporate ...
Article by Swathi Turlapaty | 04 Jan 2010 | 2 comments
1.0 Introduction The data protection system must be regarded as a ‘mission critical’ element of any modern data center. The design of any data protection system must, as far as possible, eliminate single points of failure so that data can be ...
Article by Swathi Turlapaty | 04 Jan 2010 | 0 comments