Quantcast
Channel: Symantec Connect - Vision User Conference - Articles
Browsing all 30 articles
Browse latest View live

SA B08: Managing Multi-Tier Application Availability and Orchestration with...

Today’s data center environments are riddled with dependencies and cross-dependencies that may impact overall successful recovery if not followed closely. Are you frustrated that you cannot guarantee...

View Article



SA B13: Deep Dive: Cluster File System 6.0 New Features and Capabilities

Attend this technical deep dive session to learn how Veritas Cluster File System addresses the challenges of minimizing application downtime. You will learn how Cluster File System spans servers to...

View Article

SA B14: Veritas Operations Manager Advanced: the Swiss Army Knife of the Data...

A perfect storm is brewing. The large-scale deployment of virtualization and introduction of Big Data workloads will exacerbate storage growth to unprecedented levels. Veritas Operations Manager...

View Article

SA L04: Create enterprise grade storage and availability platform for Hyper-V...

Get your hands dirty and learn how to setup a cost-effective and highly available environment for Hyper-V environment. Perform storage live migration without impacting applications. Recover Hyper-V...

View Article

SA B15: Deep Dive: Storage Optimization and High Availability in evolving...

Windows data center is changing fast with the onset of SSD, Hyper-V, Azure, and  Windows 8. Adopt the transformations that are relevant to your business with confidence with Veritas Storage Foundation...

View Article


IS B01: Defeating Advanced Authentication Threats with Device, Behavior and...

Is your organization interested in deploying strong authentication but struggling to find a solution that doesn’t interfere with the end user’s experience? Or are you tired of the cost and...

View Article

IS B03: Look Inside O3: Symantec's New Cloud Security Platform

Learn about the latest developments on providing secure access to cloud applications for both internal, external and mobile users utilizing Symantec O3.IS B03 Inside Symantec O3.pdf

View Article

IS B02: The Device has left the Building: Mobile Security made easy with PKI

Some people consider digital certificates and the Public Key Infrastructure (PKI) that manages them complex technologies that never took off. In reality, digital certificates can be easy to use and...

View Article


IS B22: Your Email Is Outsourced to the Cloud and is Mobile, Are You...

You’ve just outsourced your email to the cloud and your employees are adopting the latest mobile devices to access their work email. Are you looking for a comprehensive solution that can incorporate...

View Article


ST B10: Cloud 2.0: The Future of the Cloud

Cloud computing has matured and is rapidly becoming an integral part of IT strategies.  The next era of cloud computing has begun, and while some parts of the future cloud will look like today’s cloud,...

View Article

IC L08: Gateway Email Encryption / Data Loss Prevention Integration

Learn about, configure, and use our popular Symantec Gateway Email Protection product along with our market leading Data Loss Prevention to detect confidential data and use configurable responses to...

View Article

IC L19: Consolidate Information from Across Your Infrastructure to Create a...

How to implement external data connectors for data relevant to PCI and map that data to controls alongside data from across your environment. Using Analysis within Control Compliance Suite, map...

View Article

IC L09: Mobile Email Encryption for iOS

Learn about, configure, and use our iOS Email Encryption product. During this session you will see how easy it is to provision users and devices to both send and receive secure emails on Applie iPhone,...

View Article


IC L18: Security Management Case Study: Get the most from your security...

Learn how to maximize business value from your existing Symantec security investments like Symantec Endpoint Protection (SEP), Data Loss Prevention (DLP), Control Compliance Suite (CCS) with Symantec...

View Article

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File...

Many corporate users are utilizing Dropbox for corporate data. In this session you will learn how Symantec File Share Encryption can be used to protect this data before it leaves the safety of the...

View Article


IC L17: Strategically understanding your IT environment: Install and...

In this session, the attendee will have the opportunity to install SPC Enterprise, configure external data connections, and create meaningful, actionable views of that data. Using a hands-on scenario,...

View Article

IC L11: Automated Encryption Using PGP Command Line; Overview & Lab

Do you have data processes that need protecting? Do you archive clear-text information and hand it off to a third party for storage? Would you like to know more about Symantec’s command line encryption...

View Article


IC L16: Using Managed Security Services Security Analytics for Threat Assessment

Perform in-depth analysis of log data, including correlation of data from multiple technologies, to understand the process of identifying threats using tools such as Splunk or Symantec Security...

View Article

IC L15: MSS and DS Portal Walkthrough

Gain hands on experience using the Managed Security Services (MSS) portal to simulate identifying incidents within your network.   Use the next generation DeepSight Early Warning Services (EWS) portal...

View Article

IC L13: Integrating DeepSight Intelligence into 3rd Party Solutions

You’ve installed Snort, Splunk, or ArcSight to collect log data, now what?   Session attendees will learn how DeepSight DataFeed can be integrated into their existing log management solution to...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images