Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Executive Summary I/O Fencing provides protection against data corruption and can guarantee data consistency in a clustered environment.  Data is the most valuable component in today’s enterprises. Having data protected and therefore consistent at ...
Article by AHerr | 10 Dec 2014 | 0 comments
This whitepaper is aimed at technical architects and IT decision-makers at customer companies as well as architects and consultants involved in the design and planning of technical solution architectures for SAPcentric business solutions. Executive ...
Article by Gereon Vey | 19 Nov 2014 | 0 comments
Monitor Solution is an excellent product. However, one snag I hit hard in it's implementation is that the primary mechanism for delivering alerts is not email but the event console. This meant that I had to open up a web browser everytime I wanted ...
Article by ianatkin | 30 Oct 2014 | 0 comments
Hello All, Follow the below steps and you are ready to scan for Heartbleed vulnerability: 1. In the CCSVM Console Web interface, click Administration from the top menu. Under the Scan Options Section on the administration page, click the manage ...
Article by isaneh | 15 Oct 2014 | 0 comments
Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
In Part 1, https://www-secure.symantec.com/connect/articles/d... I have discussed what happened when you back up to a dedup folder/OST appliance. After our series of backups, the dedup store looks like this abcde = FileA-FB1, FileC-IB1, ...
Article by pkh | 02 Oct 2014 | 0 comments
The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 2 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 22 Sep 2014 | 1 comment
You can download the full technical white paper below – it is intended to assist partners and customers as they implement data protection solutions based on the Backup Exec™ 3600 R3 Appliance. This brief will explore the following topics as they relate ...
Article by GFK | 12 Sep 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 05 Sep 2014 | 0 comments