By 2014, 60% of global companies are expected to pilot, deploy or expand their BYOD programs (RainKing). As BYOD has become a fixture in the workplace, with 72% of employees clamoring to have their personal devices work-enabled, the IT industry has watched as the familiar “perimeter" model has become untenable. Data is going to more places, and ending up on a wider variety of devices, than ever before. A new model for protecting data has become a necessity. Organizations have tried to do so in a multitude of ways: extending policies to cover mobile devices, monitoring usage, MDM solutions, and even NAC; all have been methods used to try and create the most stable environment for mobile technology. Let Integralis security expert Mike Gabriel explain how to best balance mobile productivity and security in this Security Talks installment.
1.Discover how your peers are trying to protect mobile data.
2.See how the perimeter is being sculpted (or not) by the IT industry.
3.Find out what the future holds for BYOD in the workplace.
Doug Turner, CEO of Mantis Technology Group, talks about how his team built Pulse Analytics, a sentiment analysis solution using text analytics tool running on SAP HANA One. Hear how his team strengthened the capabilities of this solution while simplifying their data architecture by replacing 20 servers with only 1 SAP HANA One instance.
Big data has the potential to provide an incredible amount of insight into your business, infrastructure and customer behavior. But the issue is: how do you convince your CIO/CFO to fund a big data project? Are you sure it's worth the hype? What strategies should you employ to speak to your executives?
Join this panel of experts as they discuss all of these issues and more to convince your executive a big data project is worth the hype.
Get a leg up on intermittent problems, watch this webinar to learn how OptiView XG v10 can inject test traffic to measure network performance, examine the traffic's impact on infrastructure, spot ongoing problems, expose intermittent issues, and map out exactly where problems are located.
Ever feel like you spend more time converting security information from one format to another, than actually connecting the dots hidden within it? The Collective Intelligence Framework (CIF) is a data processor for pulling in and normalizing out all these threat intel sources into a single combined dataset.
Learn how to...
Get CIF up and running
Connect intelligence sources to CIF
Leverage CIF with your existing security controls
Host: Conrad Constantine, Community Manager, AlienVault
Guest: Todd Leetham, Visiting Scientist, RSA I The Security Division of EMC
Event Date: Tuesday, May 21, 2013 at 11am PDT
Summarizing over 7 hours of content on cloud, this BrightTalk session will give attendees a sneak peak into this topic by the actual SPDEcon speakers.
SNIA’s new storage industry event, the Storage Plumbing and Data Engineering Conference (SPDEcon, pronounced “Speedy-con”), is targeted for “hardcore” storage development and data engineering experts whose positions may involve configuring, integrating, and supporting storage and data management solutions – often referred to as the “storage plumbing.”
The following sessions will be discussed:
- Ceph: A Unified Distributed Storage System
- Hybrid Clouds in the Data Center – The End State
- Combining SNIA Cloud, Tape and Container Format Technologies for the Long Term Retention of Data
Special SPDEcon Registration Discount for BrightTalk Subscribers:
Get $100 off of the regular registration rate when you go to http://ow.ly/l4kph and register with code SPDE13DISC023.
When a business rolls out IT systems to run its operations, the basic foundation on which the system is built is the network that carries the traffic. To be able to solve problems in such a complex environment, it's vitally important to know what is happening on the network. Whether it's the behavior of the applications, behavior of the users or rogue elements that interfere with application delivery, knowing what is going on is half the battle of solving the problem.
This short video will discuss why having a well-designed workflow for identifying suspect traffic patterns and finding even the smallest volume of interesting data can make the difference in finding the culprit of pesky performance problems.
According to a recent survey by MobileIron, 81% of companies accommodate personal mobile devices in the workplace and more than 50% have formal BYOD (“Bring Your Own Device”) programs in place. Another survey from iPass found that nearly half of IT managers in organizations implementing enterprise mobility strategies believe their company’s approach to be insufficient. Register for this webinar and discover how to avoid missteps on your path to mobility.
•How can you quickly and securely mobilize your workforce?
•What controls should be available to IT for a BYOD initiative?
•How do innovative companies collaborate in a mobile-first world?
Get your questions answered and explore the latest integrated solution from Box and MobileIron. Over 150,000 companies around the world, including 92% of Fortune 500, use Box for content sharing that both users and IT love and adopt. MobileIron is a Box partner and recognized leader in the Gartner Magic Quadrant for Mobile Device Management.
Testing is an integral part of system installation, especially with the very tight loss budgets of high data rate systems. This webinar helps you understand what to ask and how to evaluate the results you are given.
Today’s high-speed networks require more stringent performance than typical LANs. To be sure the networks will support today’s networking applications it is important to properly clean, inspect and test optical fiber networks. In this webinar, Collier will address which tests are required and recommended, and how to perform them.
Electronic Information Technology Systems (EITS) and sustainability go together and the new sustainability rating system - the Sustainable Technology Environments Program (STEP) - shows you how.
This presentation will provide an overview of current sustainability codes and standards activities in the United States that have the potential to affect EITS design, installation, operation and performance. This will serve as an introduction to an in-depth overview of the STEP rating system for electronic information technology systems.
Rodney Casteel, Commscope; Alfred Flores, Berktek; Adrian Young, Fluke Networks.
The need to support efficient operations of high-speed data centers poses unique challenges to network managers. This presentation will provide information that can help attendees better evaluate their choices and understand the tradeoffs inherent in their decisions.