Are you the publisher? Claim or contact us about this channel

Embed this content in your HTML


Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog

older | 1 | .... | 161 | 162 | (Page 163) | 164 | 165 | .... | 254 | newer

    0 0
    0 0
  • 07/30/15--23:50: Veritas Social Digest 31-Jul
  • Double Summer Edition

    Veritas Social.jpg

    #VtasPart #HPOI with this weeks double summer social digest from @VeritasTechCo at

    Veritas Partners Harness the Power of Information with this weeks double summer social digest from our TwitterLinkedIn & YouTube channels  Simply click share at the top of the page to share this blog post with your professional social networks or follow and share selected stories below.

    Brand Story

    Matt Cain Interview
    Exciting times lining up ahead! Get a closer look as @veritastechco VP Matt Cain shares his insights: #HPOI
    Linkedin: Wondering what’s coming up next for Veritas Technologies Corporation? Here’s a great overview of the new strategy from Vice President Matt Cain: 

    Veritas Homepage
    Excited to see plans shaping up for  @veritastechco! Here’s a list of the latest offerings: #HPOI
    Linkedin: Here’s a good reference web page to help stay up to date with Veritas Technologies Corporation’s newest offerings:

    Backup & Recovery

    SpiceWorks Data Link Ming Chow Testimonial
    : Here’s an informative video about #NetBackup for those wanting to know more about the @veritastechco solution:
    Linkedin: There’s been a lot of chatter lately about Veritas Technologies Corporation’s NetBackup solution. Here’s a quick video outlining the overview of benefits with Support Service Architect for Datalink Ming

    Symantec WP: Key Factors for Modernizing
    Check out this interesting read on the advantages of a modernized appliance #backup solution: @veritastechco #HPOI
    Linkedin: Curious, how is your company handling backup and recovery? Based on what I’ve seen, every company has different needs. Here’s a good white paper giving sound advice on where to start and how to pick the right solution to meet those needs:

    Competitive Report: DCIG COMMVAULT
    Here’s an interesting back up needs comparison study between vendors. Nice to see Veritas highlighted: #HPOI
    Linkedin: Many data backup solutions may seem similar, but this study sheds light on the differences. Nice to see Veritas Technologies Corporation highlighted here:

    Video: NetBackup vs. EMC
    What do you consider the most important factors in #data backup?Speed & scope? #HPOI @veritastechco
    Linkedin: When it comes to data backup and recovery, I see speed and scope as important factors. Here’s an interesting Veritas Technologies Corporation video on the topic:

    Information Availability

    Analyst report: ESG Solution brief: Software-defined Storage: It’s What It Does That Matters
    Considering an update to your organization’s #SDS approach? Here's a good report from #HPOI
    Linkedin: Does your IT team use software-defined storage? This brief is a good read to get to know what we’re doing at Veritas Technologies Corporation with SDS:

    Software-Defined Storage Infographic
    Interesting fact: The software-defined storage market is expected to grow to $6.2B by 2019 @VeritasTechCo #HPOI
    Linkedin: The software-defined storage market is expected to reach $6.2 billion by 2019. Here’s an interesting infographic that shares Veritas Technologies Corporation’s approach:

    InfoScale page
    Twitter: Did you know 74% of Fortune 100 companies use @veritastechco? Here’s a helpful summary of Veritas InfoScale: #HPOI
    Linkedin: Do you consider information to be the lifeblood of your business? If so, here’s a helpful summary of Veritas Technology Corporation’s InfoScale offerings:

    Information Governance

    Analyst Report: Neuralytix Data Paper
    Spending too much time on useless data? Here are some good tips for #IT & #data pros: #HPOI @veritastechco
    Linkedin: Does your team spend too much time dealing with useless data? How do you cope? Here are some ideas from Veritas Technologies Corporation on ways to get rid of unnecessary clutter: 

    Analyst Report: Gartner Newsletter
    Check out these great resources highlighting getting started with your company's #infogov plan: #HPOI @veritastechco
    Linkedin: These resources from Gartner for Veritas Technologies Corporation are helpful if you’re looking to craft a solid information governance

    InfoMap page
    Check out this cool @veritastechco Information Map demo tool: #HPOI
    Linkedin: Here’s a cool new VeritasTechnologies Corporation Information Map demo tool. Check it out and let me know what you think:

    Video: Chaos to Clarity
    Data management can be risky business. This @veritastechco video helps lay out important facts: #HPOI
    Linkedin: Interesting to think that businesses can be at risk from their own assets. This helpful Veritas Technologies Corporation video explains why:

    Industry Report

    Gartner Report: Rebalance Your Information Risk
    Guilty of #data hoarding? Break the habit with tips from this @Gartner_inc report: #HPOI @veritastechco
    Linkedin: It’s easy to save everything out of convenience, but is an unstructured data nightmare worth it? This Gartner report highlights the best ways to tackle data overload:

    Partners, we look forward to helping you innovate, experiment & accelerate in the Veritas Expert Community


    0 0

    Register to attend live enablement events.

    VTA Banner.jpg

    Announcing the NEW Veritas Technical Academy Platform!

    The Veritas Sales & Technical Academy (VSA / VTA) training platform is designed to empower Veritas employees and Partners with the latest sales & technical product and solution information. VSA/VTA offers a first class training experience by bringing Veritas and Partners together under the same learning umbrella, ultimately allowing attendees to learn Veritas go-to-market strategies and deep-dive technical information as one combined sales force instead of two separate entities.

    Attend live virtual events designed to provide the training you need to succeed. We offer informative sessions examining business best practices, technology solutions, and sales strategies — all to further your business success and growth.

    *Please visit the Global Enablement Events Calendar & select your region to register today.

    0 0

    Initial testing of Windows 10 performed by Symantec shows that a wide range of the current version of IT Management Suite functionalities can be used to manage these systems. The Symantec support statement specific to IT Management Suite 7.6 HF3 can be found here.

    The early support functionality currently includes the following components and solutions of IT Management Suite:

    • Symantec Management Agent
    • Inventory Solution
    • Patch Management Solution
    • Power Scheme
    • Real-time System Management
    • Software Management Solution
    • Task Management

    Symantec will issue a full support statement for IT Management Suite once the full testing of Windows 10 is performed and all the known limitations are addressed.

    For questions related to Windows 10 and Symantec Endpoint Security, go here.

    0 0

    Symantec have release 12.1.6 MP1 (12.1 RU6 MP1).

    This version of Symantec Endpoint Protection includes new features in the following areas:

    • The Symantec Endpoint Protection client adds support for Windows 10.

    • Symantec Endpoint Protection Manager adds database support for SQL Server 2012 SP2.

    • Symantec Endpoint Protection Manager adds browser support for Google Chrome through 43.0.2403.107, and for Firefox through 39.0.

    Relevant information/articles for upgrade and defect fixes links are included below

    New fixes in Symantec Endpoint Protection

    Upgrade or migrate to Symantec Endpoint Protection 12.1.6 or

    What's new in Symantec Endpoint Protection 12.1.6 MP1

    0 0

    The Knowledge Base doesn't have any current documentation for Dynamic Management Views.

    If you have really high fragmentation you may need to manually perform maintenance first via

    To check fragmentation run DBCC SHOWCONTIG with ALL_INDEXES on each EV database.

    You will want to follow this technote: SQL Maintenance/Backups: This should be done daily against the Vault Store Database(s) and weekly against the Directory Database:

    IMPORTANT NOTE:  If the values for Extent Switches, Logical Scan Fragmentation, and Extent Scan Fragmentation are not within recommended values after performing scheduled maintenance, you may need to modify the 'Rebuild Index' maintenance task settings or perform the task more frequently.

    You probably want have maintenance run per the TECH74666 when services are stopped for EV and with high fragmentation situations have the databases offline; or you can have maintenance run during the window in Backup Mode once fragmentation is reduced.

    The first part of the TECH74666 is for backups; the second half is for maintenance:

    For maintenance, from the list of tasks, choose

    Shrink Database (this process is optional, but highly recommended)
    Rebuild Index
    Update Statistics
    Back Up Database (Full)
    Back Up Database (Transaction Log)
    Maintenance Cleanup Task

    After running the DBCC SHOWCONTIG query, examine the results for tables that have over 1,000 pages scanned.

    - Extent Switches - Value should be 1 less then Extent Pages Scanned
    The higher this value is above the Extent Pages Scanned, the more fragmented the page order
    - Logical Scan Fragmentation - under 1%
    Latency occurs once logical scan fragmentation exceeds 10%
    Once fragmentation exceeds 50%, indexes are no longer used
    - Extent Scan Fragmentation - under 50%
    - Avg. Page density (full) - over 90%

    Also see:
    Recovery Model:
    Routine monitoring and maintenance for the Accelerator environment
    SQL Index Fragmentation and Statistics

    0 0

    The Oct. 1st deadline is approaching fast

    By October 1st, US healthcare providers, insurers, and related businesses are expected to start using the new ICD-10 procedure and diagnostic codes for billing and health statistics purposes. I thought it was timely to send out a reminder and recap on this topic.


    The ICD-10 conversion date had already been pushed out three times (2009, 2013, and 2014), but now it looks like it will really happen (with the possible exception of a 6 months transition period during which providers may be able to use both, the old ICD-9 codes or the new ICD-10 codes).

    ICD codes (“International Statistical Classification of Diseases and Related Health Problems”; managed by the WHO) are used for various purposes, from classifying diseases and treatments over gathering data for health statistics to submitting bills to health insurances and Medicaid/Medicare. The ICD system  has actually been around since 1893, back then it was called “International List of Causes of Deaths”.

    ICD-9-CM is the main US version used to classify (and bill for) diagnosis and procedures and has been in use for 30 years. The transition to ICD-10 is a significant one since it not only changes the nomenclature and structure of the codes, but also adds much higher granularity (i.e. more codes for different diseases and stages). Hospitals will need  to move from the old ICD-9 system of about 17,000 codes to the new ICD-10 with about 155,000 different codes. For example, “Angioplasty” is now 1170 different codes in ICD-10!

    ICD-9 codes typically have the format of 3 digits followed by a period and an optional 2 digits, e.g. 123.12 (there are a few exceptional uses of letters). ICD-10 codes have a leading letter followed by two numbers and 4 alphanumeric extension characters.


                    ICD-9 code "919.4 Insect Bite”

                    ICD-10 code “S52.521A Torus fracture of lower end of right radius, initial encounter for closed fracture”

    Impact on our Customers:

    The conversion to ICD-10 coding will affect pretty much every single IT system in the hospital, from patient registration over clinical documentation to billing. Healthcare customers should be well on their way with upgrading their main systems (EHR, billing, etc.) and training staff. I suspect that most providers are well on their way, but some may not and October is just around the corner.

    One specific area of concern are “shadow systems”, things like personal spreadsheets or Access databases which people have developed for their own purposes, e.g. to support clinical research, or to bridge a specific data conversion step during the billing process. And any missed system that is overlooked in the conversion could jeopardize an important administrative or clinical process.

    Here is how Symantec solutions can help:

    1. Our Endpoint Management Suite (Altiris) platform to discover software assets and licenses in use.
    2. Further, Altiris to support system conversion, software upgrades, staging, contract and license management.
      (Note that often a simple application software upgrade may result in a platform or hardware upgrade, require data conversion, user account transfer, etc. – this is where the use of a tool like Altiris can really make a difference).
    3. Our Control Compliance Suite (CCS) or Workflow solution to manage upgrade projects, training, launch, etc.
    4. Data Loss Prevention (DLP) to discover “shadow systems” (e.g. personal spreadsheets) or “shadow processes” (e.g. emailing of ICD-9 codes).
      (Note that ICD-9 codes are not very unique, so the search criteria would need to be customized and include groups of ICD-9 codes and/or the combination of code and descriptor).
    5. Data Insight to help understand who has ownership of unstructured data like spreadsheets on Fileshares, and to determine if these are actually still in use.


    General explanation:

    Comparison of ICD-9 and ICD-10 codes:

    Best practices for managing conversion:

    Please feel free to reach out to myself or your Symantec Healthcare account manager if you want to discuss this further and understand how Symantec can help you in the final stage of the process.

    0 0

    This blog explains the process to use the SEPprep tool to uninstall in a semi-automtated way and then automatically install the SEP 12.1.x client. does not have an automated uninstallation tool. This can be a challenge if you have to migrate from to another endpoint security client.

    I used this process to semi-automate the process to migrate ~2000 server and workstation computers from to SEP 12.1.6.


    • Endpoints with
    • SEP 12.1.x Management Server installed and configured
    • SEP 12.1.x installation media
    • File server to host the SEP 12.1.x client

    Preparing the SEPprep tool and SEP 12.1.x client

    1. On a computer that is accessible to the network, create a folder called SEPPrepInstall.

    2. Share SEPPrepInstall.

    3. Create a sub-folder called InstallLogs.

    4. With the SEPM console, export an unzipped SEP client installation package into SEPPrepInstall.

    Note: This SEP client package will be for workstations or servers and 32-bit or 64-bit.

    5. Navigate to \\FileServerName\SEPPrepInstall\SEPClientPackageName and change the name of the SEP client installer from setup.exe to SEPSetup.exe.

    6. From the SEP installation media open \SEPInstallMedia\Tools\NoSupport\SEPprep, copy SEPprep.exe or SEPprep64.exe (depending on the endpoint architecture) and SEPprep.ini to \\FileServerName\SEPPrepInstall\SEPClientPackageName\.

    Note: The \SEPInstallMedia\Tools\NoSupport\SEPprep also contains the SEPprep documentation called SEPprep.pdf.

    7. Change the name of SEPprep.exe or SEPpre64.exe to setup.exe.

    8. Open SEPprep.ini and update the replace the contents below. Modify to suit your environment.

    MessageBoxText=Prepairing your system for Symantec Endpoint Protection 12.1.x  During this process other antivirus products will be removed.\n\nIf you are prompted please fully remove these products.
    RunBeforeRemoval=reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /t REG_SZ /d \\FileServerName\SEPPrepInstall\Servers_WIN64BIT\SEPsetup.exe

    Note: The path the InstallLogs folder will change based upon where the InstallLogs folder is hosted.

    Note: The path to SEPsetup.exe will change based on where SEPsetup.exe is hosted.

    9. Administrators can now run setup.exe from the SEPPrepInstall folder or deploy it with SCCM.

    Running The Migration Process

    1. On the endpoint running, run setup.exe from \\fileservername\SEPPrepInstall\SEPClientPackageName\ or SCCM.

    2. An Information popup will appear on the endpoint. Read the content of the popup and click OK.


    3. A second popup will appear asking the user to select which software to uninstall. The user must select Cloud Agent. This will automatically select – Endpoint Protection. Click OK (if – Endpoint Protection is not automatically selected, select it and click OK.)



    4. While the client is being uninstalled refrain from using your computer.


    5. When asked to restart your computer click Restart Now.


    6. Upon reboot the new Symantec Endpoint Protection client will be installed.

    7. While Symantec Endpoint Protection client is being installed refrain from using your computer.

    8. When asked to restart your computer click Restart Now.


    Note: If you see a pop up warning about other users potentially using your computer click Yes.


    9. When your computer restarts use it as normal.

    0 0
  • 08/03/15--18:05: Google Nearline is Online
  • Store data in the Google Cloud with NetBackup 7.7

    Last March we announced that NetBackup 7.7 would be one of the first backup and recovery solutions to integrate with Google Cloud Storage Nearline. On July 23, Google Nearline became generally available. Congratulations to Google for reaching this milestone.

    Public cloud service providers like the Google Cloud Platform offer compelling advantages to the business. IT organizations must transform their current cost center model into a more agile model that can serve the business more effectively. Those that do not adapt may find themselves at a competitive disadvantage in the marketplace. For many organizations, adopting cloud services and storage is a key part of that strategy.

    With more enterprises looking to lower costs and improve agility by exploiting cloud storage, NetBackup 7.7 introduces a newly-designed cloud connector integrated with several cloud storage providers, including the Google Cloud Platform. We have redesigned our S3-compatible cloud connector to better utilize available network bandwidth with parallel data transfer techniques. The results are spectacular. Backups to and restores from certified S3 cloud storage targets are now up to 30 times faster than they were with earlier releases!

    To learn more, check out this InfoBit video on using S3 cloud storage with NetBackup 7.7.

    0 0
  • 08/04/15--10:55: TechTrek Campers on Tour
  • Research has shown that young women start leaving science and math courses during their middle school years, when social acceptance becomes more important than their academic interests. The American Association of University Women (AAUW) noticed this trend and set out to change it by encouraging young women to continue their interests in science, technology, engineering and math (STEM) exploration and learning.

    They developed Tech Trek camps, week long science and math camps designed to develop interest and self-confidence in STEM subjects. The program specifically targets young women entering eighth grade, and the girls spend the week on a university campus partaking in hands-on activities in their chosen core class, rotating labs, and field trips. This year, more than 1,600 girls will attend camps at one of the 21 sites around the United States. This year, AAUW added a core class in cybersecurity afterSymantec issued a grant of $100,000  to expand the Tech Trek curriculum. In July, the class was piloted in three camp locationsBowling Green State University in Ohio, Stanford University, and the University of California, Irvine.

    “Women make up just 26 percent of the computing workforce, but AAUW is working hard to increase that number. We’re glad to have Symantec Corporation supporting our efforts to encourage girls to consider the full range of STEM studies and career options, including becoming cybersecurity experts,” said AAUW CEO Linda D. Hallman, CAE.

    Part of the experience is exposing these young women to careers available to them. Symantec's Mountain View, CA headquarters hosted two field trips for the TechTrek campers on the cybersecurity track, one on July 9th and one on the 16th. During the field trip, the girls toured the Symantec campus, learned about Symantec’s SSL validation, and how to tell if they are safe on a website. They also played the Symantec ‘Race to Stay Safe’ and ‘Protecting your Data’ games online.

    TechTrek 1.jpg

    During the visit on the 9th, the girls toured Server Lab A, where they saw server racks and learned about some of Symantec’s products on the Information Management (Veritas) side like the NetBackup Appliance. On the field trip on the 16th, the girls toured the Trust Services building where Symantec employees research companies who have applied for SYMC SSL certificates. They had the rare opportunity to see the Operations Center and the fingerprint and retinal scanners for employee access.

    Several Symantec employees volunteered their time to talk about what they do at Symantec and what it’s like to work in cyber security.

    “Working with the young ladies of TechTrek was a true pleasure. Their excitement to learn more about cybersecurity was genuine. Their level of understanding of our technologies was impressive. Who would’ve thought there are kids out there that believe what we do is cool? Time well spent,” said Darryl Cyphers, Principal Program Manager in Symantec’s Legal department.


    A special thanks to Rachel Yokum, Darryl Cyphers, Jeff Cardoso, George Schnurle, and Alexander Hebels for volunteering their time presenting to the young ladies.

    For more information about Symantec’s Community Investment, visit us on our Corporate Responsibility website.

    Ashley Savageau is Symantec's Community Relations Manager.

    0 0

    One of the things that pretty much every Enterprise Vault administrator encounters during their tenure of looking after an Enterprise Vault Exchange mailbox archiving environment, is the question of how to handle people who have left the organisation.

    I have written about this in the past, but it has come back to light again in the last day or two, because I spotted a great webinar which is scheduled for this week from Adept-tec.  Check out their website for details:

    0 0

    In my last blog I talked about some of the impacts cyber security can have on an organisation, the emerging trends we are seeing at a board level and the lack of visibility today’s CISO’s are suffering from.  

    The CISO’s lack of visibility as described in my previous blog certainly helps to explain some of the interesting security investment trending we are seeing at present. Investments in solutions that can ‘solve’ the cyber challenge have been making waves recently. However, as we all know, no single solution can solve this challenge; it will always take a combination of people, process and technology to combat cyber threats. Emerging positive trends include buying preferences that enable more holistic analytics-driven threat monitoring to get a better handle on cross-domain security visibility. At the same time, incident response outsourcing provides scalable and rapid ‘surge capabilities’ to tackle the critical global shortage in cyber security resources (while handling cyber incidents when the worst happens).  

    But there are more cyber security issues that demand attention at the board level. While most organisations acknowledge that cyber security is no longer an IT issue, but a business problem, there is still confusion as to who is ultimately responsible for cyber security. Some believe the buck stops with the CFO, while others think cyber issues should be answered directly by the CEO. This lack of clarity muddies the water when seeking to make proactive plans for better cyber security.

    Something we have come to learn is that, while cyber security is getting focus at the right levels now, the much discussed ‘gap’ between the board members and the information security leaders still exists. However, today we are seeing some interesting new approaches and great examples of CIOs and CISOs seizing the initiative once more to communicate with the board and inform them of both the cyber challenge and opportunity in front of them.

    A key shift is the evolution of the CISO role, traditionally filled by individuals with a strong background in IT and security. Now a new breed of CISOs is emerging – influencers who come directly from business backgrounds – enabling enhanced business communication and relevancy across board members.  

    Also, new engagement styles are allowing the functions to connect more effectively than ever before. While the CISO still need to conduct the traditional security planning activities, such as security control gap analysis, threat and vulnerability analysis, audit and risk management, some CISOs are linking their most critical security initiatives to wider company business programs and projects – particularly if these help to promote product or company market differentiation. Other proactive initiatives are encouraging board members to cascade security goals to business leaders to encourage cross-organisational cyber security awareness. These approaches are helping to drive successful business-aligned security projects that are proving to have far greater company-wide relevance, adoption and success. Often, this requires a different engagement style from the CISO, a deeper business understanding and an investor’s insight.  

    As for Symantec, we are committed to helping board members and security leaders seize this heightened focus on cyber security to promote and enable secure digital enterprises, communities and transactions.

    Our new analytics-driven strategies for advanced threat protection and cyber security services have been designed specifically to help CISOs be more able to answer those not so ‘simple’ questions posed by the board, while our unified security strategy will help stakeholders to go further to manage enterprise risk against industry-wide benchmarks and align business rationale against security investment choices.

    We are really interested in your perspectives on this topic and also to share and learn. Feel free to comment or get in touch to continue the conversation.

    Cyber Security_Board_people.jpg

    0 0
  • 08/05/15--18:58: (ET2566659)
  • When System memory is above 170GB Media Server Deduplication configuration may fail due to spoold core dumping

    I would like to know if there is any updated on ET. 

    KB is 2.5+ year old.

    0 0
  • 08/05/15--20:52: NetBackup and Cloudian
  • Veritas certifies Cloudian as a NetBackup storage platform

    With the release of NetBackup 7.7 we are happy to announce the certification of Cloudian HyperStore® as a supported NetBackup storage target, using our enhanced Amazon S3-compatible cloud connector. Cloudian HyperStore software delivers a fully S3 API–compliant, multi-tenant, and multiple–data center hybrid cloud storage platform. Cloud service providers use Cloudian HyperStore software to deploy public clouds and managed private clouds, while enterprises use Cloudian HyperStore software to deploy private and hybrid clouds. For those unwilling to store their data in a public cloud service like AWS, Cloudian offers a flexible alternative.

    The new cloud connector introduced in NetBackup 7.7, designed on Amazon Simple Storage Service (Amazon S3), is enhanced to significantly improve backup and restore times for Amazon S3-compatible cloud storage targets. The new connector has been performance-optimized to more effectively utilize available network bandwidth, significantly reducing backup and recovery times when compared to previous releases.

    To learn more, read what Cloudian has to say about what this will mean for our mutual customers and partners.

    0 0

    Symantec takes an in-depth look at ransomware to see where it could go next. Our research found that smartwatches could be on the ransomware shortlist.


    0 0

    Symantec hace un análisis profundo del Ransomware (forzar a la víctima a pagar un rescate por tener acceso a su información) para ver hacia dónde podría dirigirse. Nuestra investigación encontró que los relojes inteligentes (Smartwatches) están, definitiv


    0 0

    A Symantec faz uma análise aprofundada do ransomware para avaliar seus próximos destinos. Nossa pesquisa constatou que os smartwatches definitivamente fazem parte da lista de candidatos do ransomware.


    0 0
  • 08/06/15--07:47: Symantec Hires SC3 Graduates
  • The Symantec Cyber Career Connection (SC3) is helping to train under-represented populations for meaningful careers, fill a needed gap in cybersecurity skills, and round out Symantec’s pool of talented professionals. Learn about the success of SC3 one year post-launch, and meet Diana and Cullen, two SC3 graduates and new Symantec employees!

    Cybersecurity is one of the most important fields in technology, yet, there is a significant shortage of qualified candidates prepared to fill these roles—an estimated 500,000 to one million jobs remain unfilled in the U.S. alone – and this gap is expected to grow to a staggering 1.5 million by 2020.

    As this talent gap continues to widen, there is a vibrant community of under-employed young adults—including people of color, women, and veterans—that could fill at least 60,000 of these positions if properly trained.

    Last year, Symantec launched the Symantec Cyber Career Connection (SC3), combining a vision to help these underserved young adults prepare for careers in the fast-growing cybersecurity industry with a commitment to addressing the urgent need for trained professionals in this field.

    Welcome Diana and Cullen!

    From February through July, Symantec hosted four SC3 interns – two in Herndon and two in Mountain View – and is thrilled to have extended offers for full-time employment to both Cullen Covington and Diana Shafer after their graduation from the program last week. Cullen is now employed as an information security analyst in the Security Operations Center (SOC) in Herndon, while Diana is a senior information security analyst with the Global Operations Center in Mountain View.

    120px_Cullen.jpg“I believe everyone could benefit from a program like Year Up,” says Cullen. “Not only do they teach you hard skills for your desired career path, they also develop your soft skills, which a lot of young adults lack. I was blessed to be given a chance to change my life and I took full advantage. I’m fortunate to be compensated for something I genuinely enjoy doing! The path here was not easy but the support from Year Up staff, and now coworkers at Symantec, made me believe I belong in the SOC. I’m looking forward to seeing where my career takes me and I also know my journey is just beginning!”

    120px_Diana Shafer (2).jpg“I’m really grateful for the opportunities that have been presented to me,” says Diana of her SC3 experience. “It’s even more valuable because none of this was just handed to me – I had to work really hard to get where I am. The work is consistently challenging and there is never a dull moment. The best part is I am learning so much and having fun. This is such a great start to my career and I am excited for the road ahead of me. I can’t wait to see what is in store for me next.”

    Symantec is currently hosting seven new SC3 interns through January 2016.

    Moving from student to cybersecurity professional

    SC3’s success can be attributed to a combination of elements including the unique blend of classroom-based training that prepares students for key certifications, followed by hands-on internship experience and job placement preparation; as well as the support of our many partners, including leading educational and workforce development non-profits Year Up and NPower.

    In April, the first SC3 cohort in New York graduated after months of technical and soft-skills training, and last week they were joined by two more graduating classes – one in the San Francisco Bay Area, and another in Baltimore, MD. This brings the total number of SC3 graduates to 31.

    YUBA Graduation_Cyber Students.jpg

    All SC3 graduates were placed and completed successful internships with leading companies, including Marathon Consulting, KPMG, Bank of America, CBS, Citi, Morgan Stanley, New York Times, Conde Nast, TD Ameritrade, eBay, Gap, iSEC Partners, LinkedIn, Symantec, and more. Fifty-one percent of graduates have received offers of employment or acceptance into higher education programs.

    And this is just the start. Most cybersecurity professionals today were not trained from the beginning in the field and do not have cybersecurity degrees. In many cases SC3 participants will be better trained than those in the workforce today when they started.

    “I have to give Symantec credit for looking at the market and identifying a huge need in the cybersecurity field,” says Donald Ger, National Director for Partnerships and Innovation at YearUp, one of Symantec’s nonprofit SC3 partners. “They know there’s a skills gap, and much of that gap can be filled with talent who don’t have a four-year degree or technical certification. It will be a double win: in terms of filling jobs for companies and for the young adults.”

    Expanding SC3: More students, more cybersecurity professionals

    At the Clinton Global Initiative America event in June, NPower and Symantec reinforced their commitment to continue with the SC3 program in New York, and also announced that SC3 will be scaled up to serve U.S. military veterans in Dallas. NPower has administered technology-training programs for veterans since 2013 and will now add a cybersecurity curriculum to prepare veterans to enter the field.

    In addition, the National Association of Software and Services Companies (NASSCOM) and Symantec signed a Memorandum of Understanding for Building Cyber Security Skills, an initiative to develop world-class skilled and certified professionals in India. An extension of SC3, this program will support 1,000 women undertaking the cybersecurity NASSCOM certification.

    “Cybersecurity is an exciting field and one where Symantec can lead with integrity and create positive change for participants, our customers and society as a whole,” said Cecily Joseph,  “I’m extremely proud of the broad support that we are seeing and the opportunity to extend the reach of SC3 internationally and to the veteran community. We are creating the workforce of tomorrow and helping to close the cybersecurity gap by investing in the training of the future generation of STEM professionals.”

    For more information visit:

    0 0

    Twitter カードのスタイル: 


    Veritas is deeply committed to enabling organizations to leverage and transition to the cloud as easily as they manage their on-premises infrastructure, delivering highly flexible, cost-effective and secure data storage. We help customers move faster to the cloud, something that is now reinforced by the recent announcement of the integration of NetBackup™ and Enterprise Vault™ with Oracle Archive Storage Cloud Service, Oracle Extends World’s Most Comprehensive Enterprise Cloud Portfolio.  This comes at the heels of a series of recent Veritas announcements supporting additional cloud integrations.

    This suite of services makes it much easier for developers, IT professionals, business users and analysts to build, extend and integrate cloud applications, and easily move existing on-premises workloads to the cloud. What they get is seamless, secure, on-demand access to enterprise-grade cloud storage. All delivered at speed.

    What are the critical factors behind this? Most of all, to help resolve the biggest trend impacting those customers right now: the shift to a hybrid cloud future. We have taken our heritage managing heterogeneous environments to help ensure customers can transition to hybrid clouds by continuing to provide management solutions across those environments, at scale.

    As far as backup goes specifically, we have been investing in solutions that allow customers to use NetBackup (7.7 being the latest version), while leveraging third-party clouds as storage repositories. Customers may depend on our solutions, but they also want the flexibility of cloud. That is why, in addition to Oracle Archive Storage Cloud Service, we support many hybrid-cloud deployments leveraging Amazon Web Services, Google Nearline and many more. This is something our customers are increasingly asking us to ensure is readily available to them. And we are delivering against that, with NetBackup 7.7 providing a tiered storage model, and up to 30x faster backups and restores when compared to previous NetBackup releases.

    All of this performance is greatly enhanced by NetBackup Open Storage (OST) platform – a robust set of APIs that deliver an ecosystem by enabling third party storage platforms to take full advantage of the advanced feature set that NetBackup offers thus allowing our customers to realize the potential of their heterogeneous environment. These features help ensure a robust, enterprise-class protection and recovery experience. This includes the ability for sophisticated data reduction to drive down the cost of transmitting and storing data, along with granular recovery capabilities to expedite restores and minimize resource consumption.

    The OST platform also enables integration between NetBackup and the advanced feature set on the storage platform itself, so that NetBackup customers can manage features such as snapshots and replication without ever leaving the NetBackup operating environment.

    For archiving and retention management, Oracle Archive Storage Cloud Service has the potential to be used as a long term storage tier once certified for Enterprise Vault, so old or infrequently accessed data can be moved off your more precious resources. In addition, if integrated with Oracle platform’s service capabilities, Enterprise Vault workloads could be moved onto the Oracle cloud service virtual environment.  

    The upshot? You would be outsourcing the hardware and server maintenance, freeing up your IT staff, which can instead be deployed on more strategic projects. In the process, you will move the cost to an operating expense, rather than a capital expense.

    Gather all of these paybacks together and it is not hard to see why so many customers are starting to move in this direction.

    0 0

    Symantec advises users to update their browser immediately.


older | 1 | .... | 161 | 162 | (Page 163) | 164 | 165 | .... | 254 | newer