Video Screencast Help

Search

Search results

Caesars Palace, Las Vegas Mon, 05 May, 2014 - 11:30 PDT - Thu, 08 May, 2014 - 11:30 PDT Plan now to join ...
Event by LeslieMiller | 18 Dec 2013 | 0 comments
Your data is your most important asset. In an environment of exploding data growth, shrinking IT budgets, and increasing regulatory complexity, you need a backup and recovery ...
Video by LeslieMiller | 28 May 2013 | 0 comments
Many Altiris users want scoped security roles, but scheduled-based automation policies don't always move resources in a time-efficient manner for deployment. This session ...
Video by LeslieMiller | 28 May 2013 | 0 comments
In this session, customers will learn best practices for architecture design, migration planning, and migration strategies for moving from Altiris 6.x to 7.x.   ...
Video by LeslieMiller | 28 May 2013 | 0 comments
How does server virtualization change traditional high availability clustering in a data center? While the average enterprise IT shop remains firmly grounded in its virtualized data ...
Video by LeslieMiller | 28 May 2013 | 0 comments
Multiple trends are empowering frontline healthcare workers, from mobile healthcare, to cloud computing, BYOD, and social media, they have more options at hand now than any time in ...
Video by LeslieMiller | 28 May 2013 | 0 comments
You’ve installed Snort, Splunk, or ArcSight to collect log data, now what?   Session attendees will learn how DeepSight DataFeed can be integrated into their existing log management solution to identify which threats are relevant and help prioritize ...
Article by ohzone - Cheryl... | 03 May 2013 | 0 comments
Gain hands on experience using the Managed Security Services (MSS) portal to simulate identifying incidents within your network.   Use the next generation DeepSight Early Warning Services (EWS) portal to accelerate analysis and remediation of identified ...
Article by LeslieMiller | 03 May 2013 | 0 comments
Perform in-depth analysis of log data, including correlation of data from multiple technologies, to understand the process of identifying threats using tools such as Splunk or Symantec Security Information Manager and the DeepSight Portal. Speakers: ...
Article by LeslieMiller | 03 May 2013 | 0 comments
Do you have data processes that need protecting? Do you archive clear-text information and hand it off to a third party for storage? Would you like to know more about Symantec’s command line encryption product? This session will give a detailed overview ...
Article by ohzone - Cheryl... | 03 May 2013 | 0 comments