Video Screencast Help

Search

Search results

Information about using electronic books at Delivery Partner locations Ebooks for Delivery Partners.pdf (Inside Symantec, General Symantec, Education Services, Training) () Symantec,General Symantec,Education ...
Article by shaaaaf | 13 Nov 2013 | 0 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
View the Tech Exchange Keynote presentation.   Tech Exchange Keynote 2012.pdf (Inside Symantec, General Symantec) () Symantec,General Symantec ...
Article by LeslieMiller | 14 Sep 2012 | 0 comments
In today’s increasingly complex datacenter environment, providing automated high availability and disaster recovery is a major challenge. If you have a manual recovery plan, your company's operations are in your hands when a outages occur. Can you ...
Article by LeslieMiller | 07 Sep 2012 | 2 comments
Attend this session to understand why virtual-only backup tools only give you half the picture and why a backup client in a VM is not optimized for business-critical applications. See why Symantec Backup Exec and NetBackup backup more VMs than anyone in ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments
Securing a virtual environment has traditionally come at the cost of performance or virtualization density.  Symantec and VMware have built integrations across Symantec Endpoint Protection and Symantec Critical System Protection to optimally secure ...
Article by LeslieMiller | 28 Sep 2012 | 0 comments
In today’s increasingly complex datacenter environment, providing automated high availability and disaster recovery is a major challenge. If you have a manual recovery plan, your company's operations are in your hands when a outages occur. Can you ...
Article by LeslieMiller | 13 Sep 2012 | 0 comments
Mobile Device Management (MDM) is the first thing many companies think about when attempting to address mobility in the enterprise.  However, with the increasing popularity of BYOD, the restrictions of regulated industries, and other challenging mobility ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments
Managing mobile devices is all about protecting mobile data in all of the various places it is transmitted, stored and viewed. Unlike traditional PCs, mobile devices naturally communicate over channels that companies have no control over, and several ...
Article by LeslieMiller | 07 Sep 2012 | 1 comment
This session will focus on three use cases that can improve backup performance, daily operations, and disaster recovery.  How to break the backup window, throw out your VTL, and protect remote offices using NetBackup deduplication and accelerator ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments