- 759
- 661 826
Veritas Tech Channel
United States
เข้าร่วมเมื่อ 24 ก.ย. 2015
Find answers from Veritas experts on topics ranging from cyber resiliency, ransomware, data protection, Kubernetes, data insights, availability, and more.
NetBackup Flex Appliance – API Service Token
Take advantage of the Service Token and automate NetBackup Flex Appliance management with REST API. Check out our demo for a step-by-step guide to convert a User Account into a Service Account.
มุมมอง: 179
วีดีโอ
Veritas Alta™ View Cyber Resiliency Dashboard
มุมมอง 2593 หลายเดือนก่อน
Veritas Alta™ View consolidates organizational data into a unified management console, offering an overall security score. This demo showcases the Cyber Resiliency Dashboard, which allows targeted insights into vulnerable areas and offers remediation guidance.
Overview: Veritas Alta™ View
มุมมอง 3483 หลายเดือนก่อน
Veritas Alta™ View is a secure management console-delivered as a service-that brings together data from all your Veritas-managed domains into a single, aggregated view. Learn more about Veritas Alta™ View today: vrt.as/3JRRjEy Other Videos: Orchestrated Blueprint: vrt.as/3BOQuv3 Alta Copilot: vrt.as/406RbKi Cyber Recovery Dashboard: vrt.as/3NlGhcd
Veritas Alta™ Copilot Capabilities Demo
มุมมอง 1943 หลายเดือนก่อน
Now with Intelligent Job Failure Analysis, Automated Protection Policy Creation, and Audit & Protection of Unprotected Assets Veritas Alta™ Copilot continues to reshape the future of data management. Watch now to learn more: vrt.as/3YUMYJs
InfoScale Operations Manager: Simplifying Configuration of Applications for High Availability
มุมมอง 813 หลายเดือนก่อน
This video illustrates how InfoScale Operations Manager simplifies the configuration of applications for high availability. Chapters: 00:00-01:06 - Registration of nodes 01:07-1:30 - Data Center creation 01:31-1:45 - Shared Storage creation 01:46-02:42 - PostgreSQL installation 02:43-03:03 - High Availability configuration 03:04-07:47 - Failover Simulation
NetBackup Flex Appliance Personal Token Management Automation
มุมมอง 1114 หลายเดือนก่อน
As a part of continuous efforts to improve Flex Appliance management we introduced personal token for REST API based automation in Flex 5.0. In this demo you’ll discover how to securely and swiftly automate Flex Appliance management. Learn more: vrt.as/3Y7AhtY
Creating Veritas Recovery Orchestrated Blueprints
มุมมอง 3744 หลายเดือนก่อน
Veritas Alta View streamlines incident recovery with predefined, customizable workflows. These blueprints are tailored to your organization's unique recovery goals and compliance needs, ensuring a swift and structured response to breaches.
Veritas Alta™ View Cyber Resiliency Dashboard
มุมมอง 1874 หลายเดือนก่อน
Veritas Alta™ View consolidates organizational data into a unified management console, offering an overall security score. This demo showcases the Cyber Resiliency Dashboard, which allows targeted insights into vulnerable areas and offers remediation guidance.
InfoScale FireDrill Feature
มุมมอง 1144 หลายเดือนก่อน
As cyber threats escalate, being prepared for disaster recovery is more crucial than ever. With Veritas InfoScale’s FireDrill feature, you can now easily verify the high availability and disaster recovery readiness of your applications and environment. Ensure your organization is ready to respond when it matters most. Discover more about Veritas InfoScale today: vrt.as/490WFrB
Role Based Access Control - New Roles
มุมมอง 1655 หลายเดือนก่อน
Discover how easy it is to manage appliance user access in Flex 5 using new and existing base roles and newly introduced extended roles. Learn more about Veritas NetBackup Flex Scale appliances today: vrt.as/3HXJr33
How to Architect Your Systems for DORA Compliance
มุมมอง 2536 หลายเดือนก่อน
In this TL;DR video, Cloud Advocate Demetrius Malbrough explains DORA’s Article 7 and provides key strategies for backup, disaster recovery, and ransomware protection. Learn how to ensure your systems are reliable, resilient, and ready to recover from cyber threats. www.veritas.com/en/uk/information-center/dora #cybersecurity #DORA #ICTRiskManagement #dataprotection #FinancialServices #cyberres...
Proactive Measures for DORA Compliance
มุมมอง 866 หลายเดือนก่อน
In this TL;DR video, Cloud Advocate Demetrius Malbrough explains the importance of documenting your ICT risk management framework under DORA’s Article 6.5. Learn why annual reviews and proactive measures are critical for compliance and resilience against cyber threats. www.veritas.com/en/uk/information-center/dora #cybersecurity #DORA #ICTRiskManagement #dataprotection #FinancialServices #cyber...
The Evolution of Veritas Cloud Scale Technology - with Varun Grover and Santosh Lolayekar
มุมมอง 1266 หลายเดือนก่อน
Veritas is at the forefront of cloud innovation. Santosh Lolayekar and Varun Grover discuss the Veritas cloud transformation journey and how our cloud architecture is designed to meet the evolving needs of our customers. Learn more about Veritas Alta™-the most comprehensive and secure cloud data management platform: vrt.as/4b93B6w
Conversion of Oracle RAC ASM to Oracle Single Instance with InfoScale Enterprise
มุมมอง 1656 หลายเดือนก่อน
This video provides a step-by-step demo of how to convert an Oracle RAC ASM deployment to an Oracle Single Instance with InfoScale Enterprise. Chapters: 00:00 - 00:20 Introduction 00:21 - 00:47 Environment Overview 00:48 - 01:37 Primary Database Preparation on Oracle RAC node 01:38 - 04:09 Standby Database Preparation on InfoScale node 04:10 - 05:54 RMAN Duplicate 05:55 - 07:10 Switchover from ...
Strengthening Cyber Defense with DORA Compliance
มุมมอง 1186 หลายเดือนก่อน
In this TL;DR video, Cloud Advocate Demetrius Malbrough discusses the rising threat of cyber attacks in the financial services industry and the importance of the EU’s Digital Operational Resilience Act (DORA). Learn about the ICT risk management framework and how to protect your information assets with the right strategies, policies, and tools. www.veritas.com/en/uk/information-center/dora #cyb...
Driving Veritas Innovation - Hackathon Highlights with Santosh Lolayekar & Varun Grover
มุมมอง 726 หลายเดือนก่อน
Driving Veritas Innovation - Hackathon Highlights with Santosh Lolayekar & Varun Grover
Deriving Value of Secondary Data with GenAI - with Tim Burlowski
มุมมอง 576 หลายเดือนก่อน
Deriving Value of Secondary Data with GenAI - with Tim Burlowski
The Intersection of AI and Cybersecurity with Tim Burlowski
มุมมอง 1086 หลายเดือนก่อน
The Intersection of AI and Cybersecurity with Tim Burlowski
What’s next for Veritas AI? - with Varun Grover and Santosh Lolayekar
มุมมอง 1407 หลายเดือนก่อน
What’s next for Veritas AI? - with Varun Grover and Santosh Lolayekar
Commit to Security: Signing the CISA Secure-by-Design Pledge
มุมมอง 1407 หลายเดือนก่อน
Commit to Security: Signing the CISA Secure-by-Design Pledge
What is Responsible AI? - Insight from Sonya Duffin and Varun Grover
มุมมอง 867 หลายเดือนก่อน
What is Responsible AI? - Insight from Sonya Duffin and Varun Grover
Addressing Data Complexity with Veritas Alta™ Copilot-Insight from Chris Wiborg & Varun Grover
มุมมอง 1677 หลายเดือนก่อน
Addressing Data Complexity with Veritas Alta™ Copilot-Insight from Chris Wiborg & Varun Grover
AI Innovation with Varun Gover and Jayant Thomas
มุมมอง 987 หลายเดือนก่อน
AI Innovation with Varun Gover and Jayant Thomas
Patching and Updates: Your First Line of Defense Against Cyber Threats
มุมมอง 637 หลายเดือนก่อน
Patching and Updates: Your First Line of Defense Against Cyber Threats
Part 5: Enterprise Vault Legal Holds & Privilege Delete
มุมมอง 1637 หลายเดือนก่อน
Part 5: Enterprise Vault Legal Holds & Privilege Delete
Part 4: Enterprise Vault Expiring Data
มุมมอง 2127 หลายเดือนก่อน
Part 4: Enterprise Vault Expiring Data
Part 1: Enterprise Vault Management Strategies
มุมมอง 4027 หลายเดือนก่อน
Part 1: Enterprise Vault Management Strategies
Part 3: Enterprise Vault Retention Periods
มุมมอง 2087 หลายเดือนก่อน
Part 3: Enterprise Vault Retention Periods
Part 2: Enterprise Vault Configuration Options
มุมมอง 2397 หลายเดือนก่อน
Part 2: Enterprise Vault Configuration Options
Nice job, Drew.
for god's sake don't use people with Indian accent teaching classes and technotes, it's a technical matter its already hard to learn dont make it harder. use a professional announcer someone with good sound , someone who has training for this kind of speaking
If backup takes more time due to new features added in NBU versions , it's not an issue (usually). But if critical production server is down and restore gets delay due to malware scan feature, it will not add value to customers.
Or in stage "before restore" does Netbackup do advanced type of scanning which not done in previous stages . I asked because at time of restore, if NetBackup does scanning of suppose 10 TB of backup data of 1 VM's snapshot, this approach will take more time than usual direct restore from tape/ disk storage "without scanning".
Hi Veritas Team, I have 1 question: At time 14:58 You mentioned that in stage "before restore" it again scan for malware threat before restoring data on Cloud / orginal source server. But in previous step, you have mentioned in "after backup" , NetBackup automates malware scan for high scoring anomalies. Then why twice , Netbackup scan for malware threats in both stages In After backup & in before restore? Does it mean some malware threats may not be cleared in previous stages , that's why twice it needs to be scanned?
I need link please to register ,I need it now🙏
How can l get a veritas link to register please?
Has I log in veritas on my phone am not seeing sigh up in fact am seeing something different
Hi there! I’ve been watching your TH-cam videos and really appreciate your content. As I was looking through your channel, I saw some SEO improvements that could help boost your growth even more. Here’s what I can help with: • Enhance your SEO score • Write SEO-optimized titles and descriptions • Conduct thorough keyword research • Find the top tags for your niche • Optimize your hashtags and channel SEO I’d be thrilled to assist in taking your channel to the next level. Thanks for considering, and take care!
Very nice ❤
Superb Sir. Thank you so much.
Bad video. Bad Documentation. Bad Software. All this to sell more licenses (Now subscription only!)
Hi, Does Centos OS is mandatory requiremend for Host/Hypervisor OS?
What is maximum throughput? How can we get max speed to reduce the backup window?
Hi I’m a professional thumbnail artist .If you need help with your TH-cam thumbnails, I'd be happy to assist. You can even try a free trial to see the difference a great thumbnail can make! Best regards , Anuj
How can you scan a worm image?,
Hi, great video. How I can setup MFA on a Primary Server Instance? Because the options is not under Security like on a Primary Server on Linux or Windows
Hello Can we connect?
Very informative!
I really love your videos Guys! But for customers is very complicate to create reports. even the Library portal doesnt have support and not all of them Doesnt work in NITA.
How on earth do you *remove* the rail kits?!
For the 5230
i cant understant what he is sayin , buy him a decent mic , try to speak clearly
Hello sir. Veritas alta view one primary server websocket status disconnected can you please tell me how resolve issue😊
stopped scrolling for a second to dislike
buhahahaha
Hi, What about the traffic? Does anyone know how much traffic the scan host handles?
Thank you very much..super clear
This will get a lot of 👍s and subscribes.
Great presentation, D.
How long does the short lived token actually last? In other words what numerical value in time is short lived in this instance?
The initial token that is provided by Recovery Vault must be used by NetBackup within 30 days or it will have to be reissued. Upon first use of a token, NetBackup requests and receives a new token from the Recovery Vault API every 60 minutes.
Where’s the step in which the primary server is configured to accommodate connectivity from the Data Collector?
How much it would cost by year this deployment in the mentioned region?
If malicious dormant code is in the immutable backup. What happens when a need for system restore triggers the malicious code back at on-prem. How does someone know they are not backing up infected data to WORM storage?
Can we do point in time recovery with Tlog as well?
Great content
Hey Ernie, I have a portal linux server and a collector linux server. I'm collecting from my master backup server (nbu) and I want to collect from each of my netbackup appliances. Am I required to install a collector on every media server appliance that I want to monitor/pull appliance data from?
Using which kind of credential ? Because windows want username and password to mount the SMB/CIFS
A change in the SAN.CNF file needs to be done for SAN to work. Change x509_extensions to req_extensions and it should work. Using openssl req -in yourFile.csr -noout -text you should see the Subject Alternative Name section.
Great video Lorenzo!
I have installed Flex Appliance 3.1, but I cannot see the 'storage utilization' item on the monitoring dashboard. However, it was visible in the video. Could you please let me know which version was used in the video?
how can do a move to cloud keeping the dedup ?
is there a free version like with opscenter? nbu analytics foundation?
How about a how-to video for 1st timers that don't even know how to deal with API?
Good Videos. Kindly upload all the videos as you keep referring to some activities that were done in a previous video which one cannot locate in youtube. Keep up with the good work
any video / link suggestion on DB2 backup config on Netbackup please
Great content! Question for you: if the backup allows data to be anonymized for regulatory purposes (GDPR requests), is it still considered 'immutable'? If yes, why?
Great question, Kylie! That's a good one. Anonymization is allowed to modify the data for that very specific purpose so it's not immutable at that point. After all processing has been done by the backup system and it is considered final, then the backup can be considered immutable by the software and stored. I hope this answers your question.
Keep the good work , but how are writing backwards
Hey Hi Neil thank you for sharing the videos. Need small help can u confirm how can we connect the application which is showing not connected .. i want to do granular recovery please help...
How to learn basic netbackup.
Can we snapshot backup all our small company pcs to your backup servers ? We don't have company server . Only pcs and laptops
would be great to listen about deduplication from some Engeneer, but not from marketing manager
Thanks for the feedback Vadim! We have a new video series coming soon from our technical team which we hope you'll like.