Security: Back to basics (Part 1 – The Human Touch)

Taking a look at the latest quarterly update on security from Symantec, there are still some basic steps that system administrators can do to protect their network and endpoints. These are the low-hanging fruit that can help prevent attacks and comprise of confidential data. Education is still one of the top three returns on investment on the security side. An educated end-user will not click on links in emails that aren’t from trusted parties, open password-protected zip files and run their contents, and question suspicious emails with the help desk. An educated management team understands that Security is not just a line item that can be eliminated or reduced. As treats become more sophisticated at penetrating networks and endpoints, increasingly more sophisticated tools are needed to prevent, find, and remove these threats.

Symantec Government Symposium 2010 (Part 1)

The Symantec Government Symposium 2010 is here! The year’s event is packed full with great keynote speakers, breakout sessions, and more. The event is held every year at the Ronald Reagan Building and International Trade Center, and features the best and brightest in the Symantec community. With the federal IT community as the main audience, the Symposium features great topics and discussion that makes the Federal IT customer so unique. This year is no different, with topics ranging from “the Cloud” to IT Consolidation.

What to look for at Symantec Symposium 2010

In July 2005, two of the largest brands in technology came together to create the world's fourth largest software company overnight. The belief of providing a solution to both secure a customer's data and make it more available was a unique concept created by the Symantec acquisition of Veritas. Since that time, Symantec has continued to take advantage of their position in the market by fortifying their strength in the data security market with further acquisitions which included BindView, Altiris, Vontu, MessageLabs, Gideon Technologies, GuardianEdge, PGP, and now, VeriSign.

Cyber Hoarders

There is a little hoarder in all of us.  One night I was captivated by a show called ‘Hoarders’ I saw on the cable channel.  For those not familiar, this show chronicles the lives of individuals from all walks of life, from every class, from every race, and from every culture, that are caught up in a recurring pattern of collecting and holding on to “stuff”. Do not get me wrong- there is no judgment here.  “One person’s junk, is another person treasure.”  That is unless you are a spouse who is fed up with the junk (or treasure) collecting.  Or if you are a storage administrator try

To Share or Not to Share, That is the Question

When Microsoft introduced the Windows 2000 operating system, they introduced a new way of managing disks and the capacity they contained. Developed in conjunction with VERITAS Software, Disk Management in Windows 2000 uses the concept of dynamic disks to allow users to dynamically configure their storage i.e. no reboots. The default disk type, referred to as basic, allows for the creation of partitions and logical drives, much in the same vein as Disk Administrator in Windows NT.

NetBackup 7 – De-duplicate Everywhere

Heard about the new features in NetBackup 7?  If you subscribe to any Backup Technology thread, I am quite sure you have… Symantec’s marketing team has done a great job about getting the word out about the new features like VMware vStorage API functionality, OpsCenter, and Deduplication. In my previous blog I touched upon OpsCenter… but what is this whole de-duplication about?  Why do I care?  Simply put, I can de-duplicate everywhere in my NetBackup Environment.  Everywhere?  Yes, everywhere!