Hii Folks
could you please share an update why there is no voucher for India.
i guess others have also noticed similar problem. please contribute in this blog.
Hii Folks
could you please share an update why there is no voucher for India.
i guess others have also noticed similar problem. please contribute in this blog.
Almost well known error; seen during inplace upgrades from 2010 to 2012 or 2012 to 2014.
Regedit
HKLM\SOFTWARE\Symantec\...
Delete the \Puredisk\ registry key and it's child \Puredisk\Agent\. (or even rename it)
If you had done it in another inplace upgrade (from 2012 to 2014 for instance) the key will be set during this new install process again. So you have to delete or rename it once more.
After that, please restart the inplace upgrade and it should work out fine
Greets from Germany
Online crime is always personal. Cyber criminals are experts at using the data people innocently provide online to defraud or steal their identities. Educating the public on Internet security is essential for increasing safe and confident online use. Each October in the UK, Get Safe Online week reminds individuals and business how to stay safe online. This year, the theme is “Online crime is always personal. Don’t be a target.” At Symantec, online safety is a core corporate responsibility effort. Our Online Safety in the Community volunteer program encourages employees to become ambassadors for safe Internet use in their communities. Year round, we collaborate with local schools and organizations to deliver online safety workshops.
How safe are you online? Take the Quiz.
Volunteering at the TeenTech Bristol, UK Event
One of our community partners, TeenTech, organizes engaging, hands on events across the UK that draw over 500 pupils per event from the surrounding regions. Earlier this month, 15 Symantec employees volunteered at the Bristol event that took place on October 8th to deliver an interactive hacking game scenario. The hacking game, designed by Symantec employees, was facilitated to pupils from local schools in the area. The volunteers delivered 30-minute sessions on cyber security educating them on how much data we inadvertently put online that allow hackers to guess our passwords. The overall aim was to inform them on why creating secure passwords is so important. “It is great to be able to use the skills we have to educate, inform and inspire the next generation,” said James Hanlon, one of the Symantec volunteers. We’re looking forward to the London TeenTech event that is coming up December 1st!
Getting Teachers involved at “Educate First” in Dublin, Ireland
Symantec Dublin put on an event called Educate First to engage the heads of schools in Symantec’s Online Safety workshops. Hosted on October 5th, we invited several head teachers into the Dublin office to present our Online Safety in the Community initiative with the intention of getting the message out and rally excitement for their participation. Hosting this event will enable us to provide ongoing volunteering opportunities for our employees to deliver the Online Safety message to schools across Dublin.
Simple steps can protect our online identities, and getting that message out is part of our corporate responsibility. Engaging our employees in these efforts – they have the tools and the knowledge –is a win-win for Symantec and our local communities. “It’s clear that Symantec values volunteerism. Initiatives like Take 5 enable employees to give value back to organisations. It’s also a great way to get to know colleagues from across the business that you may not necessarily interact with in day-to-day business” said Nick Coates, a Symantec TeenTech volunteer.
Our Online Safety in the Community program first began in the UK and Ireland last year and has been very successful. This year we’re excited to expand the program with pilots in several United States locations.
Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What this group fashioned in 1890 was a method for merchants to insure their shipped goods. Upon landing, merchants whose cargo landed safely were expected to contribute a portion to merchants whose goods had been lost at sea. With this, an early form of insurance was born.
If we look at cybersecurity today, our information could be lost in a digital ocean we call the worldwide web. From a threat lens, the volume of attacks continues to rise as adversaries become more determined, persistent, and hostile with cyber attacks. Attackers will continue to:
The impact of a cyber attack to an organization's brand, reputation, and business operations can be catastrophic. Therefore, organizations need to plan proactively but prepare for the reactive, which includes insurance for goods, intellectual property (IP), and commerce—the assets sailing across the digital landscape. Welcome cyber insurance.
What’s driving the need for cyber insurance?
Data breaches cause reputational harm and business interruptions, but most of all—they’re expensive. The average cost of a U.S. data breach is $5.85 million, according to a 2014 Ponemon Institute report. Relying on IT defenses alone can create a false sense of security; however, no organization is immune from risk. Many are now turning to cyber insurance as another layer of protection.
When we look at the rapid adoption of cyber insurance, there are two key factors to attribute to this growth: new regulations which obligate companies to respond to information breaches; and the increase of cyber criminals using stolen information for payment fraud, identity theft, and other crimes.
What does cyber insurance cover?
Cyber insurance is evolving as fast as technology. What is considered core coverage today was not available as little as three years ago, and enhancements to coverage are being negotiated in the marketplace every day. The main coverage components to familiarize yourself with are:
Although liability is the most popular cyber insurance coverage, the majority of purchasers also buy coverage for investigating an incident and for extortion demands.
How much coverage is appropriate?
While there’s no simple answer to the amount of cyber insurance a company should consider, there are some factors to review as key inputs to this decision:
Today’s reality is that data breaches will happen. Cyber insurance offers organizations protection to limit their risk, but companies should consider all coverage options carefully. It’s not about checking off a box; it’s about finding a policy that protects the organization’s brand, reputation, and operations if they are faced with a breach. The business relevance of cyber is here to stay, and Symantec is here to help you lessen that risk for yourself and your organization.
Download the white paper “What Every CISO Needs to Know About Cyber Insurance”, a collection of essays from industry experts in the cyber insurance space.
We are pleased to introduce a very early preview of the next version of TouchDown, code named Venus.
Please note that this application is currently in a preview state, and is not intended to be used in a production environment.
Here are some of the highlights and things to consider before you try this preview.
This preview can be installed side by side with the other versions of TouchDown (You might want to turn off notifications from one of the apps to prevent duplicates). If you have a license key for TouchDown, it can be applied to activate this version as well by going to settings. If you purchased the TouchDown License key from the play store, this version will be automatically licensed.
Note that this version is NOT intended to use in an MDM controlled environment and MDMs may not be able to configure or manage this preview version.
To get a the alpha preview, please go to this link and follow instructions (https://play.google.com/apps/testing/com.nitrodesk.venus.nitroid)
We welcome your feedback on the new screens (some screens outside of email and tasks are still in development) at the TouchDown forums located here : http://www.symantec.com/connect/managing-mobility/forums/touchdown
Since I wrote the Storage Foundation Cluster File System HA on VMware VMDK Deployment Guide we have seen a lot of deployments using that architecture. Given that both Veritas and VMware have evolved the product in order to achieve the benefits of using local storage, I thought it was a good time to provide some new information about new configuration options.
VMware released Virtual SAN, which can create a Data Store using local disks. In the same way, Veritas InfoScale offers Flexible Storage Sharing capabilities, which can creates a clustered file system using any local storage, and making the file system accessible to all the nodes, which can write and read to that file system at the same time. This is a usual use case for ETL (Extract Transform Load) workloads where different hosts have to process information that is shared across all of them. Another typical use case is to provide fast failover, so the service can be recovered in a minimal time. InfoScale Enterprise integrates the Cluster File System capabilities, so the file system is always mounted and accessible with Intelligent Monitoring Framework, which is able to detect an application failure in no time.
So in this new guide Sunny and I wanted to cover how InfoScale Storage/Enteprise can be used on top of VMware using Flexible Storage Sharing capabilities. And also we wanted to document it in the case that Virtual SAN is also used. By combining both products we can create a high resiliency configuration without having to use any shared storage.
Carlos & Sunny
I had an opportunity to conduct datastore utilization alarm test at 95 % utilization. The datastore criticl alarm was set to 95% and the free space was set to 10% before the customer implemented VMware snapshot based backups. The goal of the test was to identify the response times of respective teams starting from the time the datastore reached 95% and the actual time it takes the alarm trigger to reach the monitoring team and then the time it gets notified to VMware platform team to perform vMotion to overcome datastore out of space condition. Below are the steps performed and corresponding actual results.
Test Steps and Expectations:
1. Datastore 95% alert alarms – Monitoring Team should receive the alarm
2. Ticket should be is escalated/raised with the Platform Team – performed by Monitoring Team
3. Platform Team should acknowledges the ticket – performed by VMware Platform Team
Record Test Results:
Actual Test Results:
Total time elapsed from step 1 to 3 was 1 hr. This does not include the vMotion time to overcome the datastore out of space or full condition. It was noticed that clearly the 95% threshold and 10% free space was too narrow compared to the response times of respective teams. Thus it was concluded the free space should be at least 20 % and the alarm threshould should be set down to 85 % to avoid potential outage.
In summer 2015, we launched Veritas NetBackup 7.7. It pushed through major advances in cloud backup and delivered exceptional performance for enterprises worldwide. As we approach the end of 2015, we’ve made some alterations that will boost NetBackup's capabilities even further.
NetBackup 7.7.1 makes it even easier to protect business critical data with expanded capacity for the 5330 appliance. And with the new NetBackup Copilot for Oracle feature, your customers get smarter automation and self-service capabilities that will free up time to deal with business critical issues.
Make sure you are ready to pitch why your prospects and customers should upgrade to NetBackup 7.7. Here are suggested assets to help you getting prepared:
Unstoppable with NetBackup!
Arjan van Proosdij
@arjanvp
“Digital India is our dream for the Nation. When I say ‘digital India’ it is not meant for the rich, but for those who are poor.” Prime Minister Shri Narendra Modi
Prime Minister Modi’s vision of “Digital India” is one where at least one person in each household in India is digitally literate by 2020. What exactly is digital literacy? It is the capacity to find and understand information using digital technology. In this age dominated by fast moving advancements in technology, developing that capacity to understand and communicate with technology is essential for creating responsible and empowered digital citizens and communities. We may think that everyone on the planet has technology at their fingertips, but millions are still left in the dark. In an effort to reach across urban and rural areas, the nation-wide initiative National Digital Literacy Mission (NDLM) tackles digital literacy through awareness campaigns, education and training programs. The NASSCOM Foundation currently serves as the industry’s Secretariat for the National Digital Literacy Mission. The multi-stakeholder effort between the Indian government, companies, and non-profits empowers communities and also creates opportunities for collaboration.
Symantec recently partnered with NASSCOM to expand the Symantec Cyber Career Connection (SC3) program to India! Check out the story.
NDLM Center Opens in Pune
One such collaborative success was the recently inaugurated NDLM center in Pune, India. On October 6th, IDEA Foundation in collaboration with Symantec, celebrated the opening of the new center. IDEA works with underprivileged youth and women from slums and schools in the Pune region and this new training center will increase the educational capabilities of the NGO and increase opportunities to those they serve. The center is already actively training 35 students in computer literacy! Symantec contributed computers, software, and grant money to help with the set up and operational costs of the new NDLM center! In honor of Symantec’s donations, IDEA invited Symantec’s Swapnil Bhoskar, Sr. Staff HR Business Partner, as the Chief Guest!
Computer Donations across India
Symantec’s hardware donations have benefitted several long-standing NGO partners in India. Since July of this year, Symantec has refurbished and donated 80 computers plus docking stations and chargers. Product donations – hardware and software – are Symantec’s largest mechanism of support to the non-profit community and has allowed us to help over 25,000 organizations globally each year. In India, the refurbished computers found a new home in three non-profits:
Symantec has been collaborating with these organizations for community advancement and the computer donations is one more way to provide support for the important work that each of these organizations do within their communities.
For more information on Symantec's Community Relations program in India, please reach out to Swapnil_Bhoskar@Symantec.com.
After downloading and installing the 7.6 Upgrade for Servicedesk, while attempting to login to the Processmanager portal, the following error popped up
Server Error in '/ProcessManager' Application.
Runtime Error: Description: An Exception occured while processing your request.
After changing the Processmanager’s Web.config file setting for CustomErrors to off, I saw the error listed below:
Server Error in '/ProcessManager' Application.
Could not load file or assembly ‘Symantec.Servicedesk.Cm.Core, version = 7.6.0.142, Culture=neutral, PublicKeyToken=null’ or one of its dependencies. The system cannot find the file specified.
When upgrading a Servicedesk system, the upgrade process requires all of the Servicedesk core dll files to be installed to upgrade correctly. The Symantec.ServiceDesk.Cm.Core.dll file was missing from the …\Program Files\Symantec\Workflow\Shared\customlib folder
A 7.6 version of the Symantec.ServiceDesk.Cm.Core.dll was provided, and copied to the correct folder. Afterwards, the upgrade installation completed successfully.
PWGen is a professional password generator capable of generating large amounts of cryptographically-secure passwords—“classical” passwords, pronounceable passwords, pattern-based passwords, and passphrases consisting of words from word lists. PWGen provides lots of options to customize passwords to the users’ various needs. Additionally, it offers strong text encryption and the creation of random data files.
Features
License: Open-Source software
Link : PWGen
On an average day, employees routinely copy sensitive production data into non-production environments. Those copies are often shared with other employees creating copies of copies. As the number of copies increase so does the security risk. For example copies are created for development and testing so that administrators can test upgrades, patches and fixes. Copies are created for analytics. Copies are created for numerous reasons to keep an organization running. By copying sensitive data, employees unwarily breach information.
At the same time, cyber criminals are well aware that copies of production data exist throughout an organization and because of this they take full advantage and routinely target non-production environments. A data breach in a non-production environment can cost an organization millions of dollars – just like a data breach in a production environment.
Data masking is an important component when protecting sensitive data. Typically organizations follow data masking steps for each data request where sensitive data is involved. But what if you only needed to mask copy data once? What if you could enable employees to access copies of data without creating and storing mountains of physical copies? Both of which would improve productivity, save money and reduce data security risks.
Start to manage and take control of your secondary data today
Veritas Velocity, coming soon, provides a new way to manage copies of production data. Instead of making and moving physical copies, Velocity provides instant self-service access to virtualized copies in minutes. Since the copies are virtual and not physical, they take up less storage saving organizations a significant portion of their hardware and software budget. Velocity also collects changes and tracks all versions until the copy is retired.
In addition, Velocity also enables you to easily control and manage whom accesses, uses and deletes copies of production data via role-based access permissions and integration with your existing authentication infrastructure thus dramatically reducing the risk of data breaches to your organization. Velocity gives you total control over your data while streamlining management, and enhancing compliance.
Overall, Velocity can help reduce data breaches and in turn reduce security risks while increasing information governance and enabling projects to be completed faster with more accurate data.
For more information or to set up a demo, please email: Kate.Lewis@Veritas.com.
We're excited to reveal our new forum design that will go live on Monday, October 23, 2015.
The forums are built in responsive design--which means that no matter if you access Connect with a phone, tablet, or desktop, you'll get the full functionality of Connect in an easy-to-read format.
In addition, the new design has the following features:
1. Featured Discussions provide information about new products, best practices, often referenced threads or other information of interest to the entire community.
2. The new forums design features a powerful faceted filtering system--including keyword filtering--that allows you to get to the information that you're looking for quickly and easily.
3. Forum thread listings provide a wealth of information including whether or not the thread needs or has a solution, how many comments and the date of the original post and last comment.
The new format extends to individual thread pages as well. You'll find the same information you've always found in the threads, but you'll be able to access it no matter what kind of device you are using.
We'd love to hear your feedback on the new design. Feel free to leave a comment below.
As the sheer volume of data continues to multiply, businesses and their IT departments are managing and protecting more information, applications and environments than ever before, with less time to do so. As if managing this data wasn’t complicated enough, companies also need to implement high performance solutions across a variety of different platforms that can readily scale with growth.
With that need in mind, Veritas is unveiling its latest NetBackup Appliance, release 2.7.1. This solution provides an extraordinary level of visibility during the backup and recovery process with Oracle databases, empowering administrators to independently complete their tasks while remaining aware of what’s happening elsewhere in the environment. The appliance release also provides double the amount of previously available capacity for the NetBackup 5330 Appliance, allowing companies to scale as their data grows.
Among the key features within NetBackup 2.7.1:
But with NetBackup Copilot, Oracle DBAs have the opportunity to actually act as “co-pilots,” using the NetBackup Appliance as the landing pad for their data. DBAs are able to independently manage backups using native Oracle tools on their own schedules while having confidence that the data will progress through the appropriate tiers of storage based on pre-established storage lifecycle policies (SLPs). At the same time, the backup team can see the DBA performing the backup and know their pre-established SLPs will manage the storage, retention and movement of copies to disk, tape or cloud storage tiers.
For the first time, both backup and database administrators have full visibility during the entire backup and recovery processes, giving them the access and control they desire, while helping to ensure they meet their companies’ governance policies. Copilot also dramatically reduces backup times with NetBackup Accelerator for Oracle, a feature designed to achieve full backups in the time it takes to do incremental backups.
NetBackup 5330 maximizes storage capacity, reducing operating and capital expenditures. Having greater density and thus delivering more capacity in less space, enables data centers to reduce the required amount of floor or rack space devoted to data protection. It’s also an integrated purpose-built backup appliance that is ENERGY STAR® certified, delivering greater power and cooling savings.
These enhancements build on top of the recently announced features of NetBackup 7.7.1, including Accelerator for NDMP and support for the new Amazon S3 Standard – IA cloud platform.
As Veritas moves toward becoming an independent company, we look forward to continuing to bring innovative products to market.