Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

The answer is almost! Even the smallest business, if relying on IT systems for critical operations like sales, production, industrial control system, tax processing or electronic receipt, some kind of DR capability should be in place. Depending on ...
Article by RAPHAEL F CARVALHO | 20 Jun 2014 | 0 comments
Cena comum no departamento de TI de praticamente qualquer empresa: Precisamos comprar um novo Storage! Seja porque o Storage atual está próximo a ficar sem garantia, ou não suporta mais a performance dos ambientes a que serve, ou mesmo a necessidade ...
Article by RAPHAEL F CARVALHO | 06 Mar 2014 | 0 comments
As a Disaster Recovery and High-Availability Consultant, I've participated in several disaster recovery exercises, for different customers in different industries, most of them large financial institutions, that are severely regulated here in Brazil ...
Article by RAPHAEL F CARVALHO | 16 Dec 2013 | 0 comments
If you want to have pre installtion check,Health checkup, recommendations and collect logs for support. Then please go through the document so that you can learn how to run a Sym help tool Sym Help tool.docx Its a great start!  ...
Article by Samir Ahmed | 12 Aug 2013 | 5 comments
Dear All I would like to provide you a simple HOWTO for backing up and restoring Active Directory with Symantec NetBackup My Environment: Master / Media Server = Windows 2008 R2 64 Bit Active Directory = Windows 2008 R2 64 Bit ...
Article by Faisal Saleem | 23 Jul 2013 | 4 comments
Often, technology choices are often guided and decided either by wide market rumor or speculation. However, in an ever expanding and intensely competitive market, little room exists for those willing to risk large and critical infrastructure components ...
Article by rreid | 09 Apr 2013 | 0 comments
De-Militarized Zone or the DMZ is the portion of the network which has two main specifications: 1-      Contains servers and services which are accessible from outside of the network. 2-      Any access to these servers and transaction with them ...
Article by Farzad | 19 Mar 2013 | 7 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
Hi Everybody,                       You may be facing lot of problems with a virus infected systems in your  IT environment. Here is a tool which will help your endpoints to recover after a massive virus outbreak. If the endpoints are  heavily ...
Article by Samir Ahmed | 13 Jan 2013 | 1 comment
Regulatory compliance is a critical factor in the development of an IT Business Continuity strategy. The requirements vary across industry sectors and geographies. It is also worth noting that not all regulations may apply in a specific business ...
Article by sai_mukundan | 02 Jan 2013 | 1 comment