Video Screencast Help

General Symantec

Results for General Symantec

The August edition of the Symantec Intelligence report provides the latest analysis of cyber security threats, trends, and insights from the Symantec Intelligence team concerning malware, spam, and other potentially harmful business risks. The data used ...
Blog Entry by Symantec Analys... | 12 Sep 2012 | 0 comments
I need a solution Dear All We have Symantec endpoint protection manager in our organisation but we do not have back up files.Last week Server Hard disk has problem and we have ...
Forum Discussion by ramrauniyar | 08 Sep 2012 | 11 comments
Congratulations to Ray O'Connor from CompuCom Systems , Inc. for winning the random drawing for an iPad 2 for having completed the recent Symantec Certification survey! Stay tuned for survey results in the upcoming weeks... Train. ...
Blog Entry by Beverly van de Velde | 07 Sep 2012 | 0 comments
In today’s increasingly complex datacenter environment, providing automated high availability and disaster recovery is a major challenge. If you have a manual recovery plan, your company's operations are in your hands when a outages occur. Can you ...
Article by LeslieMiller | 07 Sep 2012 | 2 comments
Attend this session to understand why virtual-only backup tools only give you half the picture and why a backup client in a VM is not optimized for business-critical applications. See why Symantec Backup Exec and NetBackup backup more VMs than anyone in ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments
Securing a virtual environment has traditionally come at the cost of performance or virtualization density.  Symantec and VMware have built integrations across Symantec Endpoint Protection and Symantec Critical System Protection to optimally secure ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments
In today’s increasingly complex datacenter environment, providing automated high availability and disaster recovery is a major challenge. If you have a manual recovery plan, your company's operations are in your hands when a outages occur. Can you ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments
Mobile Device Management (MDM) is the first thing many companies think about when attempting to address mobility in the enterprise.  However, with the increasing popularity of BYOD, the restrictions of regulated industries, and other challenging mobility ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments
Managing mobile devices is all about protecting mobile data in all of the various places it is transmitted, stored and viewed. Unlike traditional PCs, mobile devices naturally communicate over channels that companies have no control over, and several ...
Article by LeslieMiller | 07 Sep 2012 | 1 comment
This session will focus on three use cases that can improve backup performance, daily operations, and disaster recovery.  How to break the backup window, throw out your VTL, and protect remote offices using NetBackup deduplication and accelerator ...
Article by LeslieMiller | 07 Sep 2012 | 0 comments