SA B08: Managing Multi-Tier Application Availability and Orchestration with...
Today’s data center environments are riddled with dependencies and cross-dependencies that may impact overall successful recovery if not followed closely. Are you frustrated that you cannot guarantee...
View ArticleSA B13: Deep Dive: Cluster File System 6.0 New Features and Capabilities
Attend this technical deep dive session to learn how Veritas Cluster File System addresses the challenges of minimizing application downtime. You will learn how Cluster File System spans servers to...
View ArticleSA B14: Veritas Operations Manager Advanced: the Swiss Army Knife of the Data...
A perfect storm is brewing. The large-scale deployment of virtualization and introduction of Big Data workloads will exacerbate storage growth to unprecedented levels. Veritas Operations Manager...
View ArticleSA L04: Create enterprise grade storage and availability platform for Hyper-V...
Get your hands dirty and learn how to setup a cost-effective and highly available environment for Hyper-V environment. Perform storage live migration without impacting applications. Recover Hyper-V...
View ArticleSA B15: Deep Dive: Storage Optimization and High Availability in evolving...
Windows data center is changing fast with the onset of SSD, Hyper-V, Azure, and Windows 8. Adopt the transformations that are relevant to your business with confidence with Veritas Storage Foundation...
View ArticleIS B01: Defeating Advanced Authentication Threats with Device, Behavior and...
Is your organization interested in deploying strong authentication but struggling to find a solution that doesn’t interfere with the end user’s experience? Or are you tired of the cost and...
View ArticleIS B03: Look Inside O3: Symantec's New Cloud Security Platform
Learn about the latest developments on providing secure access to cloud applications for both internal, external and mobile users utilizing Symantec O3.IS B03 Inside Symantec O3.pdf
View ArticleIS B02: The Device has left the Building: Mobile Security made easy with PKI
Some people consider digital certificates and the Public Key Infrastructure (PKI) that manages them complex technologies that never took off. In reality, digital certificates can be easy to use and...
View ArticleIS B22: Your Email Is Outsourced to the Cloud and is Mobile, Are You...
You’ve just outsourced your email to the cloud and your employees are adopting the latest mobile devices to access their work email. Are you looking for a comprehensive solution that can incorporate...
View ArticleST B10: Cloud 2.0: The Future of the Cloud
Cloud computing has matured and is rapidly becoming an integral part of IT strategies. The next era of cloud computing has begun, and while some parts of the future cloud will look like today’s cloud,...
View ArticleIC L08: Gateway Email Encryption / Data Loss Prevention Integration
Learn about, configure, and use our popular Symantec Gateway Email Protection product along with our market leading Data Loss Prevention to detect confidential data and use configurable responses to...
View ArticleIC L19: Consolidate Information from Across Your Infrastructure to Create a...
How to implement external data connectors for data relevant to PCI and map that data to controls alongside data from across your environment. Using Analysis within Control Compliance Suite, map...
View ArticleIC L09: Mobile Email Encryption for iOS
Learn about, configure, and use our iOS Email Encryption product. During this session you will see how easy it is to provision users and devices to both send and receive secure emails on Applie iPhone,...
View ArticleIC L18: Security Management Case Study: Get the most from your security...
Learn how to maximize business value from your existing Symantec security investments like Symantec Endpoint Protection (SEP), Data Loss Prevention (DLP), Control Compliance Suite (CCS) with Symantec...
View ArticleIC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File...
Many corporate users are utilizing Dropbox for corporate data. In this session you will learn how Symantec File Share Encryption can be used to protect this data before it leaves the safety of the...
View ArticleIC L17: Strategically understanding your IT environment: Install and...
In this session, the attendee will have the opportunity to install SPC Enterprise, configure external data connections, and create meaningful, actionable views of that data. Using a hands-on scenario,...
View ArticleIC L11: Automated Encryption Using PGP Command Line; Overview & Lab
Do you have data processes that need protecting? Do you archive clear-text information and hand it off to a third party for storage? Would you like to know more about Symantec’s command line encryption...
View ArticleIC L16: Using Managed Security Services Security Analytics for Threat Assessment
Perform in-depth analysis of log data, including correlation of data from multiple technologies, to understand the process of identifying threats using tools such as Splunk or Symantec Security...
View ArticleIC L15: MSS and DS Portal Walkthrough
Gain hands on experience using the Managed Security Services (MSS) portal to simulate identifying incidents within your network. Use the next generation DeepSight Early Warning Services (EWS) portal...
View ArticleIC L13: Integrating DeepSight Intelligence into 3rd Party Solutions
You’ve installed Snort, Splunk, or ArcSight to collect log data, now what? Session attendees will learn how DeepSight DataFeed can be integrated into their existing log management solution to...
View Article
More Pages to Explore .....