Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


older | 1 | .... | 163 | 164 | (Page 165) | 166 | 167 | .... | 254 | newer

    0 0

    Working with Cloud Storage Discover

    Overview

    New in DLP 14 is the ability to scan Box.com for confidential data that may be stored in an enterprise's Box.com envrionment (See https://www-secure.symantec.com/connect/blogs/configuring-boxcom-network-discover-scan-dlp-14 for more information.). Once a Network Discover Scan has been ryun and a policy is violated an autoamtica response rule can visually tag a file within Box.

    This post will cover creating this response rule

    Configuring the Response Rule

    The first step to confiugre the response rule is to enable the response rules for scanning with the Discover Target.  If the checkbox is not enabled th response rule will not trigger.

    box remediation.png

    The response rule then needs to be created and also assigned to the policy in order for it to work.  Within the system add a new response rule and select the type "Automatic"

    box response rule.png

    Under the "Tag" section of this response rule, add whatever your company would like to display within Box.com

    What this looks like

    When an incident is generated within the system it will generate the response rule.  The incident report will look like:

    incident report.png

    The "tag" icon next to the Box.com icon shows the resposne rule has been applied.

    The incident snapshot shows a more detailed view of this, including the response rule:

    incident detail.png

    And then within Box.com itself one can see the tag applied

    visual tag.png


    0 0

    Twitter カードのスタイル: 
    summary

    We are looking for Backup Exec 15 Feature Pack 1 customers to participate in a Pilot Program for our upcoming Cloud Connector who can test, validate and actively provide feedback on the Cloud Connector.

    If you are interested in applying for this Backup Exec 15 Cloud Connector Pilot program, please apply through this link: https://symbeta.symantec.com/callout/?callid={F71D56EC-2110-407E-9C02-BA4992CA4CFF}

    We look forward to your interest and participation in this Pilot program.

    Kind regards,
    Mikko Nykyri

    @BackupMikko


    0 0

    Symantec confirms existence of flaw, which requires victim to voluntarily run an application for exploit.

    続きを読む

    0 0

    シマンテックは、被害者がアプリケーションを実行すると悪用される脆弱性の存在を確認しました。

    続きを読む

    0 0

    Symantec Data Center Security

    続きを読む

    0 0

    Sprint Demo's

    Hello NBU Users!

    I have a Scrum Team who is looking for a few customers to provide feedback on what they have been working on.

    What We Need:

    The Team needs at least 3 customers who either use or have need of Bare Metal Restore in a Suse environment. 

    What's involved:

    For customers who are interested, we would like to have you participate in a few WebEx calls.  There would be at most three 1-hour calls, and these would be aproximately 2 weeks apart. At the end of a sprint cycle, you would get to give the team feedback on what they have been working on for the past few weeks.

    The team would work with your schedule for each of these calls.

    What Do You Get Out Of This:

    This is an opportunity for you to give feedback and help guide the future NBU.  You get to talk directly to the Product Owners and Developers working on this feature.

    Interested?

    If you are interested, or have questions, please send me a direct message, or reply to this post.

    Thank You!

    Elizabeth 


    0 0

    Tree2.JPG

    To stay ahead in a digital world of sophisticated adversaries focused on attacking companies, countries, and the technologies we use on a daily basis, we need People armed with security knowledge and experience. At Symantec we have a laser focus on building, growing, and maintaining security IQ for both our own experts, as well as enabling customers to develop security practitioners with real world experience. Symantec’s Cyber Security Services business is focused on solutions built to create a more secure enterprise by combining the power of People with Technology. One of our innovative solutions in this area is a cyber wargames simulation, which helps organizations sharpen the skills and harness the power of their most valued asset, their People.

    Today there is widening gap of cybersecurity professionals needed and available talent, leaving organizations ill-prepared to detect, respond, and remediate attacks. Fewer than two-thirds of organizations believe they have the staff or skillset necessary to address today’s growing cybersecurity challenges. Enterprises, universities, war colleges, government and industry leaders all need an ecosystem to build their security IQ and grow the cyber talent pool. As the world’s largest cybersecurity company, we acutely recognize the importance of this and built a sophisticated program to enable hands-on cyber training. When we look at other high-risk environments like medicine or aviation, immersive learning through simulation is common practice to ensure safe outcomes. By applying that same approach to cybersecurity,organizations will gain the advantage of having security practitioners ready to face a broad array of attacks, attackers, and operational security scenarios that exist in the wild. Otherwise, the current gap of cyber readiness ultimately increases incident response time and business impact for an organization when they are actively attacked.

    To address this challenge, Symantec developed immersive live-fire simulation solutions that provide security professionals the critical operational experience necessary to fight cyber battles. Our innovative approach includes both cloud-based and physical environments which makes the immersive experience real—going beyond teaching the theoretical to providing professionals with a safe mock-world to learn under fire how to get ahead of cyber threats. 

    As a lever for continued success, Symantec has acquired start-up Blackfin Security, a leader in cyber skills development, to accelerate innovation for our new Security Simulation solutions. By expanding the Symantec team with Blackfin’s security talent and technical expertise, including their industry recognized Hacker Academy, we are positioned to advance the industry with new, forward-looking virtual-reality cyber programs focused on bridging the cyber skills gap for companies and countries.

    Symantec is leading the security industry by looking at skills development from a customer lens and actively developing new solutions, which enables organizations to combat the attacker by building cyber warriors. Together, we can solve the biggest challenges we face today and shift the tide in the fight against adversaries. 


    0 0

    We can easily donate money or give hardware, but it’s the time that we give that really gets young people going.

    About five years ago what started as occasional volunteering at my son’s robotics after-school program has morphed into a full force nonprofit program that exposes middle and high school students to hands-on engineering and technology projects.

    As a parent of two children, I have often lent a hand with my children’s after-school activities. I coach my daughter’s softball team and, when I saw there was a need, got involved with my son’s robotics club. The teacher was overwhelmed and had little bandwidth but the students’ interest was strong. I was particularly impressed that these youngsters were asking about concepts that I helped to teach in graduate-level computer science courses! We enrolled the students in a VEX Robotics competition, a competition where student teams are tasked to design and build a robot to complete exercises such as throw balls, do chin-ups, or achieve other engineering challenges. There was a group of students that wanted to take it further. Some wanted to learn about underwater robotics, others were interested in rocketry or zero robotics (robotics related to space), so we thought – what can we do to expand this?

    Hungry for More – Virginia State Champions

    Last year, a group of parents got together and we organized a nonprofit under the U.S. STEM Foundation called Engineering Explorer Post 1882, a program that stems from the Learning for Life organization that focuses on building young people’s technical skills. Specifically focusing on engineering and technology, our Explorer Post includes twenty-five students from eight middle and high schools in the Haymarket, Virginia area.

    Three middle school and one high school teams entered the 2015 VEX competition that happened in April this year. While preparing for the competition, we were able to borrow several robotics kits and purchase some unique items (in part thanks to Symantec’s Matching Grants program!) and the young engineers worked tirelessly on their robots. At the culmination in February, three of our four student teams successfully made it to the Virginia State Championship. Two of them came out as State Tournament Champions! The teams that won, the Pineapple Pigs high school team and the All About the Base middle school team, went on to compete in the world competition, finishing in the top 100!  All the teams worked really hard spending every Tuesday and Thursday preparing and giving up most of their Saturdays so we are proud that their efforts paid off. This coming year the students have already started prepping for the upcoming VEX competition and we need to purchase our own robot kits as the loaners from last year are not available; this school year we are also getting more students involved, as the demand is growing.

    Robotics is just the tip of the iceberg. There are many more STEM related projects buzzing around and this year, the students decided to plunge into my world.

    Expanding into the Cyber World

    This school year the students wanted to dive into the cybersecurity world. It’s an area that is more fluid and intangible and they were all intrigued to learn more about it.  Last school year a few students participated in CyberPatriot, a national competition sponsored by the U.S. Air Force that teaches defense of computers.

    Check out the interview with Dan Guido, NYU Polytechnic’s Hacker in Residence, where he talks about the learning benefits of Capture the Flag competitions, such as CyberPatriot.

    I recently hosted the first class this school year where I shared with them different Cyber related careers, how they can get into the field, and what education they need. We then got hands-on as a Cyber Security Penetration Tester by using the Symantec Cyber Security Simulation – thanks to Brian Varner and Symantec’s Cyber Simulation team.

    The kids were really energetic and found the hands-on part very challenging. The intent was to work through a few of the scenarios and then let them compete, but when they found it a bit overwhelming, we changed tactics a little, and spent several hours capturing the flags together.  This step-by-step method turned out to be a great way to teach the thought process, as we white-boarded each goal, what we knew, and how we would go after capturing the desired information.

    You don’t know what you don’t know, and guiding them through the simulation allowed me to share my tips and the tools out there that are available to them. It’s important to expose young people not only to the career opportunities, but also to the community and systems that are available. I suggested that they volunteer their time to small business or nonprofits to build their hours to get their Certified Information Systems Security Professional (CISSP) certification.

    Leon1.png

    The students practicing cybersecurity exercises using the Symantec Cyber Security Simulation.

    The Symantec Cyber Security Simulation team was extremely helpful every step along the way, and were instrumental in allowing these students to gain an understanding of the Cyber related careers that they may want to work towards!  In particular, Brian Varner, Stan Kiefer, Mike Garvin, and Jimmy Griffin; many others were probably involved, and I thank them too!

    Leon2.png

    The students that came out to the cybersecurity class on a Saturday.

    We will continue to build on the cyber program in our Explorer Post and I plan to give more classes to expose the students to other cyber related opportunities. The next class will focus on the cyber analyst role, the counterpart to the penetration tester. And this school year, our middle school and a high school teams are already preparing for the CyberPatriot competition coming up in January!  

    Giving Back to Our Community

    At Explorer Post 1882 we want each of the youngsters to excel and learn, but we also really reinforce the message of giving back. Just as I and other parents volunteer our time to share our experience with these young people, we want them to also share what they’ve learned and contribute to the community and to those less fortunate.

    The teams have volunteered time to help run the actual VEX competition – they helped set up, tear down, and some of the high school students acted as judges for the middle school events.  The All About the Base middle school team actually won the Community Award at the VEX Robotics World Competition for their work in the community.

    Leon3.png

    All About the Base team accepting the Community Award at the VEX World Competition.

    Recognizing that many students do not have the same advantages in life, the team got involved with a program rebuilding computers for donation to underprivileged students. Virginia has a program where excess computers from government agencies are available for reconditioning. The students dissected, cleaned, and rebuilt twenty computers, loaded them with antivirus software and a new printer, then they presented the systems to underprivileged families. The young engineers also taught the families how to use their new computers. While it was a lot of work for them since it was during the middle of exams and VEX competitions, the heartfelt thanks from the families gave them a view of how they can really impact the lives of those around them.

    This year the students are looking to do the same thing and hope to donate even more computers than last year to families in need.

    Why This All Matters

    There are many reasons why this all matters from an individual development perspective to a community-building exercise all the way to building a responsible workforce for our future. On a basic level, math can be boring for young people when they have to learn about it through a book. But when you ask them to build a robot and make it move, then it becomes hands-on, applied learning. That is when it clicks. Projects that give young people a chance to learn by doing are more interesting for the students and more effective for their learning.

    These young people have digital mindsets and they are excited about technology and cybersecurity, but they don’t know how to get to where we are as successful technologists or where to get the information. They are hungry for our experience.We are accountable to build responsible youth and build a future pipeline of engineers, scientists, and cybersecurity professionals. Right now we are in a cybersecurity crisis because we simply do not have enough professionals to fill these needed positions. We have a chance to help young people from all walks of life reach these opportunities, but we need to provide the guidance – as I mentioned we don’t know what we don’t know and we have the opportunity to share what’s available to them.

    What continues to drive me is when I see those Ah-Ha moments and when I get to write stellar recommendations for college applications to help them get to the next step. Young people are looking for good adults in their life; they want to know how to be successful and what steps they need to take.

    It goes without saying that all this would not have been possible without the time from other individuals from Symantec and the community at-large. The Cyber Simulation team at Symantec generously helped and I would love to get more people involved because there are more opportunities than people can imagine. On the near term, I would love to get more people to come teach short classes on securing systems. Yet, if I were to dream big, I would like to inspire everyone to get involved… especially our executives through speaking events at local schools related to cyber and the careers available - after all, the youth of today are where we are going to be hiring from very soon and relying upon to secure us.

    Leon4.png

    A collage of pictures from Explorer Post 1882’s first year! They also made a video highlighting all the activities.

    Leon Davidson is Symantec's Federal Intelligence Account Manager


    0 0

    Competition is a fact of life for most organizations and most business functions. Is there really any vector of the world we live in today, that competition doesn’t exist? I am sure if we thought about this enough we could probably come up with a few exceptions, but for the most part organizations are competing with other organizations on a daily basis.

    In this environment, more and more organizations look for efficiencies and innovations to not only remain competitive, but to gain a competitive edge. All managers appreciate, at least intuitively, that time is money, and most will invest to save time—and the money it represents—if they see a clear opportunity. Taking time out of a business gets interesting, however, when it represents a systematic change in the way a company accomplishes its work and serves its customers. Then saving time can provide sustainable competitive advantage.

    These companies make decisions faster, develop new products earlier, and convert customer orders into deliveries sooner than their competitors. As a result, they provide unique value in the markets they service, value that can translate into faster growth and higher profits.

    In these top-performing companies, fast cycle time plays an important role. The basic idea is to design an organization that performs without the bottlenecks, errors, and inventories most companies live with. The faster information, decisions, and materials can flow through a large organization, the faster it can respond to customer orders or adjust to changes in market demand and competitive conditions. Less time is spent fighting fires and coordinating. More time is available for planning, for initiating competitive activity and innovation. Overall costs shrink, customer service improves, quality is higher and innovation becomes the norm.

    Veritas Velocity, a new and exciting copy data management and data virtualization solution coming later this year, can help you dramatically shorten cycle times by providing easier and faster access to data than before. Through rapid 24x7 self-service access to data, there’s no more waiting, delays or resource dependencies associated with obtaining fresh data. Now you create as many virtual copies as you need, when you need them without the overhead or burden of storing and protecting physical copies. Projects complete faster resulting in improved productivity, faster time to market, and a competitive edge.

    To learn more about Velocity, schedule a meeting or request a demo, please email Team_Velocity@symantec.com


    0 0

    Competition is a fact of life for most organizations and most business functions. Is there really any vector of the world we live in today, that competition doesn’t exist? I am sure if we thought about this enough we could probably come up with a few exceptions, but for the most part organizations are competing with other organizations on a daily basis.

    In this environment, more and more organizations look for efficiencies and innovations to not only remain competitive, but to gain a competitive edge. All managers appreciate, at least intuitively, that time is money, and most will invest to save time—and the money it represents—if they see a clear opportunity. Taking time out of a business gets interesting, however, when it represents a systematic change in the way a company accomplishes its work and serves its customers. Then saving time can provide sustainable competitive advantage.

    These companies make decisions faster, develop new products earlier, and convert customer orders into deliveries sooner than their competitors. As a result, they provide unique value in the markets they service, value that can translate into faster growth and higher profits.

    In these top-performing companies, fast cycle time plays an important role. The basic idea is to design an organization that performs without the bottlenecks, errors, and inventories most companies live with. The faster information, decisions, and materials can flow through a large organization, the faster it can respond to customer orders or adjust to changes in market demand and competitive conditions. Less time is spent fighting fires and coordinating. More time is available for planning, for initiating competitive activity and innovation. Overall costs shrink, customer service improves, quality is higher and innovation becomes the norm.

    Veritas Velocity, a new and exciting copy data management and data virtualization solution coming later this year, can help you dramatically shorten cycle times by providing easier and faster access to data than before. Through rapid 24x7 self-service access to data, there’s no more waiting, delays or resource dependencies associated with obtaining fresh data. Now you create as many virtual copies as you need, when you need them without the overhead or burden of storing and protecting physical copies. Projects complete faster resulting in improved productivity, faster time to market, and a competitive edge.

    To learn more about Velocity, schedule a meeting or request a demo, please email Team_Velocity@symantec.com


    0 0

    Help us rename the Symantec Internet Security Threat Report (ISTR)!
    続きを読む

    0 0

    Symantec advises users to use Windows Update or the Microsoft Download Center to protect against CVE-2015-2502.

    続きを読む

    0 0

    Windows Update または Microsoft Download Center を使って、CVE-2015-2502 への予防対策をとってください。

    続きを読む

    0 0

    Bug patched by Microsoft yesterday (CVE-2015-2502) has already been exploited in watering hole attacks to deliver Korplug malware.

    続きを読む

    0 0

    This is the process I use to configure Content Distribution Manager for SEP 12.1.6.

    Requirements:

    • SEP 12.1.6 installation media
    • SEP 12.1.6 SEPM server

    Configure the SEPM Server

    Steps to enable Apache Logs on each SEPM server:
    1. Access SEPM_INSTALL\apache\conf folder and take backup of httpd.conf file
    2. In httpd.conf file, enable access and error logging and set LogLevel to info.

         a. Error log: Uncomment #ErrorLog "|| bin/rotatelogs.exe logs/error-%Z.log 100M", change log file name format and log rotation to 24 hours.

         Modified line: ErrorLog "|| bin/rotatelogs.exe logs/error-%Y-%m-%d.log 86400"

        b.  Access log: Uncomment #CustomLog "|| bin/rotatelogs.exe logs/access-%Z.log 100M" combined, change log file name format and log rotation to 24 hours.

         Modified line: CustomLog "|| bin/rotatelogs.exe logs/access-%Y-%m-%d.log 86400" combined

         c. LogLevel: Change LogLevel from warn to info.

         Modified line: LogLevel info

    3. Restart Apache (net stop semwebsrv and net start semsrv).

    Install Content Distribution Manager
    1. On the SEPM server, browse to installation media folder, Tools, ContentDistributionMonitor.

    1_0.png

    2. Copy SepmMonitor.bat to E:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\Tools.

    2.jpg

    3. SepmMontor can be run from here but I create a shortcut for SepmMontor on the desktop.

    3_0.png


    0 0

    Microsoft が昨日パッチを公開したばかりの脆弱性(CVE-2015-2502)が、Korplug マルウェアを拡散する水飲み場型攻撃にすでに悪用されていました。

    続きを読む

    0 0

    Sign up for the “Staying Ahead of Advanced Threats with Symantec Cyber Security Monitoring” webinar on August 26th, 11 a.m. Pacific

    続きを読む

    0 0
  • 08/20/15--12:43: SC3: Made for Me!
  • In June of last year, we launched the Symantec Cyber Career Connection (SC3). Twelve months later, our first class of SC3 students are graduating! Today we hear from Sobia Shaikh, who joined the SC3 program through YearUp, our nonprofit partner.

    sobia.jpg

    My name is Sobia Shaikh and I currently work at Juniper Networks as an IT Security Compliance Intern. I never would’ve imagined that I would be interning at a multinational corporation less than a year from graduating from high school. It was only a dream until I joined YearUp. Instead of going to college upon graduating high school, I decided to join YearUp and I am so glad that I made that decision. I believe YearUp is a fast track to land entry-level roles in technology where the emphasis is placed on learning the soft skills and technical skills needed. Early in the program, I had the opportunity to apply to the selective cybersecurity track supported by the SC3 program. I’m grateful to be one of 17 students accepted!

    Coming to YearUp without any technical skills under my belt scared me a bit. After going through the five month Learning & Development phase, I soon found out that I underestimated myself. I joined the cybersecurity track because I was curious and wanted to discover different aspects of technology. Through the SC3 program, I am now trained and able to be anything from a systems administrator to a network defense technician.

    Joining the cybersecurity track, going through the trainings, and taking educational trips to Symantec made me realize that I belong in this field. A year ago I was planning on getting a degree in Accounting just because it was said to be an easy major. Now, my ultimate career goal is to grow as a professional in the cybersecurity field. I may not have all the skills to reach this goal (yet), but I’m willing to dedicate all of my time and effort to get there. As Muhammad Ali once said, “Champions aren't made in gyms. Champions are made from something they have deep inside them-a desire, a dream, and a vision. They have to have the skill, and the will. But the will must be stronger than the skill.” That’s what I do have: the will!


    0 0

    Twitter カードのスタイル: 
    summary

    182fwhdl14_lp_0829304978_b_0.jpeg

    Veritas Resiliency Platform is an innovative offering from Veritas that enables customers to meet stringent IT Service Continuity SLA’s. Resiliency Platform adheres to the longstanding Veritas heritage of heterogeneity, by offering customers a single solution for IT business continuity across physical and virtual applications in a heterogeneous, multi-vendor data center environment.

    1. Resiliency Platform provides a unified experience across a heterogeneous data center environment spanning physical servers and multiple hypervisors

    Today’s day and age calls for a single solution for recovery orchestration across physical and virtual environments. Resiliency Platform takes this into account - that customers have an active need to protect their applications that may be running on heterogeneous multi-vendor platforms, operating systems and virtualization technologies. Resiliency Platform provides seamless recovery for both applications and VMs across multiple hypervisors. This is beneficial if customers wish to migrate applications between hypervisors in a multi-vendor environment

    2. While MicrosoftAzure Site Recovery (ASR) supports DR at a VM level, Resiliency Platform gives customers the choice to recover VMs, applications or even multi-tier applications.

    Most hypervisor-based solutions tend to keep the VM in focus. But in reality, it’s not the VM that is important to the business. The VM is just a container for what’s really important – the business application that is running inside it. Applications today are also built up of multiple tiers- where every tier supports an essential layer of the application service running on a different piece of hardware or software. Think SAP, SAS etc. The uptime for such a multi-tier application or business service is dependent on the uptime of each individual tier.
    Resiliency Platform empowers the customer by providing them flexibility to choose the granularity at which they want to drive recovery via complete automation– whether it’s at the VM level or at the application level or a complete multi-tier application or business service. Application level DR can be a big advantage as it reduces costs for WAN links, server and storage costs, and because it keeps the application in focus – with monitoring and recovery, the business is ensured that critical applications stay up and running with maximum uptime.

    3. Resiliency Platform provides non-disruptive testing to ensure smooth failover of IT operations at runtime

    A major benefit that Resiliency Platform provides for Hyper-V environments is the ability for customers to simulate a disaster and test their recovery readiness postures. This ensures complete confidence that their recovery plans will work if they ever need to place them into action. Recovery rehearsals are completely non-disruptive to production environments and are automated, eliminating the need for extensive manual testing over weekends

    Additionally, Resiliency Platform offers a comprehensive list of features and supportability matrix for your Hyper-V environments:

    • Application Awareness
    • IT Business Service Orchestration and Insight
    • Granularity of recovery at VM and Application levels
    • Health Monitoring
    • Non-disruptive Rehearsals
    • Standardized support across physical and virtual

    Learn more about Veritas Resiliency Platform by watching the IT Service Continuity Webcast co-delivered by ESG and Veritas.


    0 0
  • 08/20/15--22:40: Veritas Social Digest 21-Aug
  • Explore #data risk #dataagility & get ready for #VMWorld

    Veritas Social.jpg

    VERITAS SOCIAL DIGEST 21-AUG

    TWEET OF THE WEEK: 
    #VtasPart #HPOI: Explore #data risk #dataagility & get ready for #VMWorld @veritastechllc http://bit.ly/1HJcyi3

    POST OF THE WEEK:
    In this weeks social digest Veritas explores #data risk #dataagility & gets ready for #VMWorld http://bit.ly/1HJcyi3

    To share this weeks social media digest with your social networks simply click share at the top of the page, copy & paste our tweet or post of the week above or follow and share selected stories below.

    BRAND STORY 

    Chaos to Clarity Video

    Twitter: We hear a lot about #data risk, but how bad is it? Sounds pretty alarming to me: http://symc.ly/1MFIXxv #VtasPart @veritastechllc

    Linkedin: It’s concerning to think that companies can be harmed from within, thanks to hidden risks in data. Here’s a good overview of these risks from Veritas Technologies LLC: http://symc.ly/1MFIXxv           

    BACKUP & RECOVERY

    NBU Benchmark Commvault
    Twitter: With so many backup options, it's important to choose carefully. This @veritastechllc report helps: http://symc.ly/1MFJ388 #VtasPart

    Linkedin: Competition is healthy, and I found this Veritas Technologies LLC report to be very telling when it comes to backup and recovery leadership: http://symc.ly/1MFJ388

    INFORMATION AVAILABILITY

    Agile IT Empowers Business Success
    Twitter
    : Balancing the ebb & flow of #info is tricky. Here’s why #dataagility is so important: http://symc.ly/1PobQvD #VtasPart @veritastechllc

    Linkedin: “Businesses today compete at the speed of thought.” Insightful information in this report from Veritas Technologies LLC: http://symc.ly/1PobQvD

    INFORMATION GOVERNANCE

    InfoGov Ebook

    Twitter: What makes #data valuable? Check out these 5 key traits from @veritastechllc: http://symc.ly/1PobTaE #VtasPart

    Linkedin: How many outdated spreadsheets and presentations do you toss into a folder instead of hitting the delete button? I’m guilty as well! This Veritas Technologies LLC report eases the anxiety of shedding data: http://symc.ly/1PobTaE

    VMWORLD

    VMWorld landing page

    Twitter: #VMWorld is right around the corner! Who's joining us in San Francisco? http://symc.ly/1MFJeQU @veritastechllc #VtasPart

    Twitter: Heading to #VMWorld? Come by booth 713 to see what's new with @veritastechllc! http://symc.ly/1MFJeQU #VtasPart

    Twitter: What are you most interested in learning at #VMWorld#Data is key for me. Visit @veritastechllc (booth 713) http://symc.ly/1MFJeQU #VtasPart

    Linkedin: We’re thrilled to be a sponsor at this year’s VMWorld! Pay a visit to Veritas Technologies LLC at booth 713 to see what’s new in data management: http://symc.ly/1MFJeQU

    VMWORLD SPEAKING  SESSIONS

    Twitter: Looking for better #backup solutions at #VMWorld? Join @veritastechllc's session around VVOL benchmarks: http://symc.ly/1MFJeQU #VtasPart

    Twitter: A must see! Join @veritastechllc at #VMWorld for best practices on vStorage APIs for data protection: http://symc.ly/1MFJeQU #VtasPart

    Twitter: Think you’re using vSphere 6 & Virtual Volumes the right way? Find out w/ @veritastechllc at #VMWorld: http://symc.ly/1MFJeQU #VtasPart

    Veritas Partners, we look forward to helping you innovate, experiment & accelerate in the Veritas Expert Community http://bit.ly/1HJcyi3

    VEC.jpg


older | 1 | .... | 163 | 164 | (Page 165) | 166 | 167 | .... | 254 | newer