Veritas Tech Channel
Veritas Tech Channel
  • 755
  • 616 733
Creating Veritas Recovery Orchestrated Blueprints
Veritas Alta View streamlines incident recovery with predefined, customizable workflows. These blueprints are tailored to your organization's unique recovery goals and compliance needs, ensuring a swift and structured response to breaches.
Переглядів: 36

Відео

Veritas Alta™ View Cyber Resiliency Dashboard
Переглядів 267 годин тому
Veritas Alta™ View consolidates organizational data into a unified management console, offering an overall security score. This demo showcases the Cyber Resiliency Dashboard, which allows targeted insights into vulnerable areas and offers remediation guidance.
Veritas Alta™ Copilot Capabilities Demo
Переглядів 8616 годин тому
Now with Intelligent Job Failure Analysis, Automated Protection Policy Creation, and Audit & Protection of Unprotected Assets Veritas Alta™ Copilot continues to reshape the future of data management. Watch now to learn more: vrt.as/3YUMYJs
InfoScale FireDrill Feature
Переглядів 42День тому
As cyber threats escalate, being prepared for disaster recovery is more crucial than ever. With Veritas InfoScale’s FireDrill feature, you can now easily verify the high availability and disaster recovery readiness of your applications and environment. Ensure your organization is ready to respond when it matters most. Discover more about Veritas InfoScale today: vrt.as/490WFrB
Role Based Access Control - New Roles
Переглядів 110Місяць тому
Discover how easy it is to manage appliance user access in Flex 5 using new and existing base roles and newly introduced extended roles. Learn more about Veritas NetBackup Flex Scale appliances today: vrt.as/3HXJr33
How to Architect Your Systems for DORA Compliance‌
Переглядів 119Місяць тому
In this TL;DR video, Cloud Advocate Demetrius Malbrough explains DORA’s Article 7 and provides key strategies for backup, disaster recovery, and ransomware protection. Learn how to ensure your systems are reliable, resilient, and ready to recover from cyber threats. www.veritas.com/en/uk/information-center/dora #cybersecurity #DORA #ICTRiskManagement #dataprotection #FinancialServices #cyberres...
Proactive Measures for DORA Compliance
Переглядів 60Місяць тому
In this TL;DR video, Cloud Advocate Demetrius Malbrough explains the importance of documenting your ICT risk management framework under DORA’s Article 6.5. Learn why annual reviews and proactive measures are critical for compliance and resilience against cyber threats. www.veritas.com/en/uk/information-center/dora #cybersecurity #DORA #ICTRiskManagement #dataprotection #FinancialServices #cyber...
The Evolution of Veritas Cloud Scale Technology - with Varun Grover and Santosh Lolayekar
Переглядів 68Місяць тому
Veritas is at the forefront of cloud innovation. Santosh Lolayekar and Varun Grover discuss the Veritas cloud transformation journey and how our cloud architecture is designed to meet the evolving needs of our customers. Learn more about Veritas Alta™-the most comprehensive and secure cloud data management platform: vrt.as/4b93B6w
Conversion of Oracle RAC ASM to Oracle Single Instance with InfoScale Enterprise
Переглядів 65Місяць тому
This video provides a step-by-step demo of how to convert an Oracle RAC ASM deployment to an Oracle Single Instance with InfoScale Enterprise. Chapters: 00:00 - 00:20 Introduction 00:21 - 00:47 Environment Overview 00:48 - 01:37 Primary Database Preparation on Oracle RAC node 01:38 - 04:09 Standby Database Preparation on InfoScale node 04:10 - 05:54 RMAN Duplicate 05:55 - 07:10 Switchover from ...
Strengthening Cyber Defense with DORA Compliance
Переглядів 78Місяць тому
In this TL;DR video, Cloud Advocate Demetrius Malbrough discusses the rising threat of cyber attacks in the financial services industry and the importance of the EU’s Digital Operational Resilience Act (DORA). Learn about the ICT risk management framework and how to protect your information assets with the right strategies, policies, and tools. www.veritas.com/en/uk/information-center/dora #cyb...
Driving Veritas Innovation - Hackathon Highlights with Santosh Lolayekar & Varun Grover
Переглядів 61Місяць тому
Nurturing a culture of innovation at Veritas has always been our top priority. Santosh Lolayekar and Varun Grover share highlights from this year’s hackathon.
Deriving Value of Secondary Data with GenAI - with Tim Burlowski
Переглядів 512 місяці тому
Are you getting the most out of your data? Extract more value from your secondary data with #GenAI. Varun Grover and Tim Burlowski discuss the possibilities and advantages of using RAG to conduct historical analysis on backup data lakes.
The Intersection of AI and Cybersecurity with Tim Burlowski
Переглядів 892 місяці тому
AI has made tremendous strides, but as it becomes more embedded in your operations, it introduces new vulnerabilities. Varun Grover and Tim Burlowski discuss the current landscape of AI-driven threats, how Veritas helps enhance cyber resilience, and provides insight into how AI is shaping the future of cybersecurity.
What’s next for Veritas AI? - with Varun Grover and Santosh Lolayekar
Переглядів 1162 місяці тому
What’s next for Veritas AI? - with Varun Grover and Santosh Lolayekar
How to Add DLO Storage Locations
Переглядів 672 місяці тому
How to Add DLO Storage Locations
Commit to Security: Signing the CISA Secure-by-Design Pledge
Переглядів 1152 місяці тому
Commit to Security: Signing the CISA Secure-by-Design Pledge
What is Responsible AI? - Insight from Sonya Duffin and Varun Grover
Переглядів 732 місяці тому
What is Responsible AI? - Insight from Sonya Duffin and Varun Grover
Addressing Data Complexity with Veritas Alta™ Copilot-Insight from Chris Wiborg & Varun Grover
Переглядів 1562 місяці тому
Addressing Data Complexity with Veritas Alta™ Copilot-Insight from Chris Wiborg & Varun Grover
AI Innovation with Varun Gover and Jayant Thomas
Переглядів 923 місяці тому
AI Innovation with Varun Gover and Jayant Thomas
Patching and Updates: Your First Line of Defense Against Cyber Threats
Переглядів 393 місяці тому
Patching and Updates: Your First Line of Defense Against Cyber Threats
Part 5: Enterprise Vault Legal Holds & Privilege Delete
Переглядів 843 місяці тому
Part 5: Enterprise Vault Legal Holds & Privilege Delete
Part 4: Enterprise Vault Expiring Data
Переглядів 1093 місяці тому
Part 4: Enterprise Vault Expiring Data
Part 1: Enterprise Vault Management Strategies
Переглядів 1833 місяці тому
Part 1: Enterprise Vault Management Strategies
Part 3: Enterprise Vault Retention Periods
Переглядів 1093 місяці тому
Part 3: Enterprise Vault Retention Periods
Part 2: Enterprise Vault Configuration Options
Переглядів 1173 місяці тому
Part 2: Enterprise Vault Configuration Options
Veritas Alta™ View Reports IT Analytics Protection or Complete Suite
Переглядів 3553 місяці тому
Veritas Alta™ View Reports IT Analytics Protection or Complete Suite
Simplifying Data Management with Veritas Alta™ Copilot
Переглядів 873 місяці тому
Simplifying Data Management with Veritas Alta™ Copilot
Essential Practices for Cyber Recovery Rehearsals
Переглядів 883 місяці тому
Essential Practices for Cyber Recovery Rehearsals
Tabletop Exercises: A Critical Tool for Cybersecurity Readiness
Переглядів 1103 місяці тому
Tabletop Exercises: A Critical Tool for Cybersecurity Readiness
Ensuring Continuity with Cyber First Responders
Переглядів 553 місяці тому
Ensuring Continuity with Cyber First Responders

КОМЕНТАРІ

  • @muhammadfurqan4970
    @muhammadfurqan4970 14 днів тому

    Superb Sir. Thank you so much.

  • @Kurushineko
    @Kurushineko 21 день тому

    Bad video. Bad Documentation. Bad Software. All this to sell more licenses (Now subscription only!)

  • @chairulf.manalu3128
    @chairulf.manalu3128 28 днів тому

    Hi, Does Centos OS is mandatory requiremend for Host/Hypervisor OS?

  • @amin4rmpucit
    @amin4rmpucit Місяць тому

    What is maximum throughput? How can we get max speed to reduce the backup window?

  • @meme_boy06912
    @meme_boy06912 Місяць тому

    Hi I’m a professional thumbnail artist .If you need help with your UA-cam thumbnails, I'd be happy to assist. You can even try a free trial to see the difference a great thumbnail can make! Best regards , Anuj

  • @lazonairdrone4398
    @lazonairdrone4398 Місяць тому

    How can you scan a worm image?,

  • @PeroTeLoDigoConHumor
    @PeroTeLoDigoConHumor 2 місяці тому

    Hi, great video. How I can setup MFA on a Primary Server Instance? Because the options is not under Security like on a Primary Server on Linux or Windows

  • @VINOD-zk6rh
    @VINOD-zk6rh 2 місяці тому

    Hello Can we connect?

  • @anjuarora1963
    @anjuarora1963 3 місяці тому

    Very informative!

  • @pakoroo29
    @pakoroo29 3 місяці тому

    I really love your videos Guys! But for customers is very complicate to create reports. even the Library portal doesnt have support and not all of them Doesnt work in NITA.

  • @michaelguiel4
    @michaelguiel4 3 місяці тому

    How on earth do you *remove* the rail kits?!

  • @mehrdadheydari7842
    @mehrdadheydari7842 3 місяці тому

    i cant understant what he is sayin , buy him a decent mic , try to speak clearly

  • @mallelasaidareddy377
    @mallelasaidareddy377 3 місяці тому

    Hello sir. Veritas alta view one primary server websocket status disconnected can you please tell me how resolve issue😊

  • @leonthethird7494
    @leonthethird7494 5 місяців тому

    stopped scrolling for a second to dislike

  • @luisandresvp
    @luisandresvp 6 місяців тому

    Hi, What about the traffic? Does anyone know how much traffic the scan host handles?

  • @iptrainersassociates1215
    @iptrainersassociates1215 7 місяців тому

    Thank you very much..super clear

  • @mrdman094081
    @mrdman094081 7 місяців тому

    This will get a lot of 👍s and subscribes.

  • @mrmcompserv
    @mrmcompserv 8 місяців тому

    Great presentation, D.

  • @fourltrman
    @fourltrman 9 місяців тому

    How long does the short lived token actually last? In other words what numerical value in time is short lived in this instance?

    • @VeritasAlta
      @VeritasAlta 8 місяців тому

      The initial token that is provided by Recovery Vault must be used by NetBackup within 30 days or it will have to be reissued. Upon first use of a token, NetBackup requests and receives a new token from the Recovery Vault API every 60 minutes.

  • @oqlus
    @oqlus 10 місяців тому

    Where’s the step in which the primary server is configured to accommodate connectivity from the Data Collector?

  • @Bigcargo77
    @Bigcargo77 10 місяців тому

    How much it would cost by year this deployment in the mentioned region?

  • @LanceMcGrew
    @LanceMcGrew 11 місяців тому

    If malicious dormant code is in the immutable backup. What happens when a need for system restore triggers the malicious code back at on-prem. How does someone know they are not backing up infected data to WORM storage?

  • @jeromeswartz1836
    @jeromeswartz1836 Рік тому

    Can we do point in time recovery with Tlog as well?

  • @guts7786
    @guts7786 Рік тому

    Great content

  • @dennispeacock6079
    @dennispeacock6079 Рік тому

    Hey Ernie, I have a portal linux server and a collector linux server. I'm collecting from my master backup server (nbu) and I want to collect from each of my netbackup appliances. Am I required to install a collector on every media server appliance that I want to monitor/pull appliance data from?

  • @3rcapital
    @3rcapital Рік тому

    Using which kind of credential ? Because windows want username and password to mount the SMB/CIFS

  • @jhromeror
    @jhromeror Рік тому

    A change in the SAN.CNF file needs to be done for SAN to work. Change x509_extensions to req_extensions and it should work. Using openssl req -in yourFile.csr -noout -text you should see the Subject Alternative Name section.

  • @Scotty_in_Ohio
    @Scotty_in_Ohio Рік тому

    Great video Lorenzo!

  • @user-um4rv4tx7e
    @user-um4rv4tx7e Рік тому

    I have installed Flex Appliance 3.1, but I cannot see the 'storage utilization' item on the monitoring dashboard. However, it was visible in the video. Could you please let me know which version was used in the video?

  • @litosertanejo8556
    @litosertanejo8556 Рік тому

    how can do a move to cloud keeping the dedup ?

  • @vela07
    @vela07 Рік тому

    is there a free version like with opscenter? nbu analytics foundation?

  • @dennispeacock6079
    @dennispeacock6079 Рік тому

    How about a how-to video for 1st timers that don't even know how to deal with API?

  • @njewjohn6326
    @njewjohn6326 Рік тому

    Good Videos. Kindly upload all the videos as you keep referring to some activities that were done in a previous video which one cannot locate in youtube. Keep up with the good work

  • @sonianaik313
    @sonianaik313 Рік тому

    any video / link suggestion on DB2 backup config on Netbackup please

  • @kyliemcklveen5100
    @kyliemcklveen5100 Рік тому

    Great content! Question for you: if the backup allows data to be anonymized for regulatory purposes (GDPR requests), is it still considered 'immutable'? If yes, why?

    • @DataProtectionGuy
      @DataProtectionGuy Рік тому

      Great question, Kylie! That's a good one. Anonymization is allowed to modify the data for that very specific purpose so it's not immutable at that point. After all processing has been done by the backup system and it is considered final, then the backup can be considered immutable by the software and stored. I hope this answers your question.

  • @Big_nigga445
    @Big_nigga445 Рік тому

    Keep the good work , but how are writing backwards

  • @v4vinayak
    @v4vinayak Рік тому

    Hey Hi Neil thank you for sharing the videos. Need small help can u confirm how can we connect the application which is showing not connected .. i want to do granular recovery please help...

  • @mansoormobilesrct7754
    @mansoormobilesrct7754 Рік тому

    How to learn basic netbackup.

  • @lenso010
    @lenso010 Рік тому

    Can we snapshot backup all our small company pcs to your backup servers ? We don't have company server . Only pcs and laptops

  • @VadimLyutiy
    @VadimLyutiy Рік тому

    would be great to listen about deduplication from some Engeneer, but not from marketing manager

    • @VeritasAlta
      @VeritasAlta Рік тому

      Thanks for the feedback Vadim! We have a new video series coming soon from our technical team which we hope you'll like.

  • @litosertanejo8556
    @litosertanejo8556 Рік тому

    how can we get a trial license is that possible ?

  • @florentmatzinger8506
    @florentmatzinger8506 Рік тому

    why are there 2 patches, one named MSWIN and one named linux, both needed on a Windows Server?

  • @elainelillian5671
    @elainelillian5671 2 роки тому

    p͎r͎o͎m͎o͎s͎m͎

  • @marcusmoreira3045
    @marcusmoreira3045 2 роки тому

    Nao responde as perguntas..!!

  • @TZAK4u
    @TZAK4u 2 роки тому

    Keep posting more such videos

  • @marcusmoreira3045
    @marcusmoreira3045 2 роки тому

    Boa noite, estou iniciando um servidor 2008 r2 com uma LTO5.. Nos DEVICES a unidade aparece.. mas nao aparece no IE do Windows.. nao instalei nada de aplicativos para executar backup´s ainda.. O que pode ser..??

  • @harrisquaqua7310
    @harrisquaqua7310 2 роки тому

    NetApp

  • @aminanwar7063
    @aminanwar7063 2 роки тому

    Do you have any demo from Tape to Access Appliance as S3 Bucket?

  • @terrencehealy3748
    @terrencehealy3748 2 роки тому

    Best Name Yet for Storage solution Engineer Chek SAN!!!!

  • @rameshbabukondeti
    @rameshbabukondeti 2 роки тому

    Hi, Please create a video for deploying NetBackup version 10.0 in Azure cloud and protecting IAAS and PAAS